xref: /rkbin/doc/release/RK322XH_EN.md (revision 36a6a646b48a269fb8179dfdf1cca9be7b16dbb3)
1*36a6a646SHisping Lin# RK322XH Release Note
2*36a6a646SHisping Lin
3*36a6a646SHisping Lin## rk322xh_bl32_v2.02.bin
4*36a6a646SHisping Lin
5*36a6a646SHisping Lin| Date       | File                   | Build commit | Severity |
6*36a6a646SHisping Lin| ---------- | :--------------------- | ------------ | -------- |
7*36a6a646SHisping Lin| 2023-08-14 | rk322xh_bl32_v2.02.bin | 44e25f04     | critical |
8*36a6a646SHisping Lin
9*36a6a646SHisping Lin### Fixed
10*36a6a646SHisping Lin
11*36a6a646SHisping Lin| Index | Severity  | Update                        | Issue description                                            | Issue source |
12*36a6a646SHisping Lin| ----- | --------- | ----------------------------- | ------------------------------------------------------------ | ------------ |
13*36a6a646SHisping Lin| 1     | critical  | Fix security vulnerabilities. | Hackers can exploit vulnerabilities to attack OPTEE OS.      |              |
14*36a6a646SHisping Lin| 2     | important | Fix memory leaks.             | Customer calls TEE_ DerivekeyFromHard may experience memory leakage issues. | 374096       |
15*36a6a646SHisping Lin
16*36a6a646SHisping Lin------
17*36a6a646SHisping Lin
18