xref: /rkbin/doc/release/RK322X_EN.md (revision 726b2e49bbeaf518f026adb2dd0c38d4b4ae74be)
1*726b2e49SHisping Lin# RK322X Release Note
2*726b2e49SHisping Lin
3*726b2e49SHisping Lin## rk322x_tee_ta_v2.12.bin
4*726b2e49SHisping Lin
5*726b2e49SHisping Lin| Date       | File                    | Build commit | Severity |
6*726b2e49SHisping Lin| ---------- | :---------------------- | ------------ | -------- |
7*726b2e49SHisping Lin| 2023-08-14 | rk322x_tee_ta_v2.12.bin | 24f5da14     | critical |
8*726b2e49SHisping Lin
9*726b2e49SHisping Lin### Fixed
10*726b2e49SHisping Lin
11*726b2e49SHisping Lin| Index | Severity  | Update                        | Issue description                                            | Issue source |
12*726b2e49SHisping Lin| ----- | --------- | ----------------------------- | ------------------------------------------------------------ | ------------ |
13*726b2e49SHisping Lin| 1     | critical  | Fix security vulnerabilities. | Hackers can exploit vulnerabilities to attack OPTEE OS.      |              |
14*726b2e49SHisping Lin| 2     | important | Fix memory leaks.             | Customer calls TEE_ DerivekeyFromHard may experience memory leakage issues. | 374096       |
15*726b2e49SHisping Lin
16*726b2e49SHisping Lin------
17*726b2e49SHisping Lin
18