~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Service Pack 15 for ThinPro 7.2 15.3 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 1. Service Pack 15 for ThinPro 7.2 ============================================================================ HP announces the service pack 'Service Pack 15 for ThinPro 7.2'. 2. Support Matrix ============================================================================ Package Platform Image ---------------------------------------------------------------------------- ThinPro 7.2 SP15.xar mt21 7.2 ThinPro 7.2 SP15.xar mt22 7.2 ThinPro 7.2 SP15.xar mt32 7.2 ThinPro 7.2 SP15.xar mt45 7.2 ThinPro 7.2 SP15.xar mt46 7.2 ThinPro 7.2 SP15.xar t240 7.2 ThinPro 7.2 SP15.xar t420 7.2 ThinPro 7.2 SP15.xar t430 7.2 ThinPro 7.2 SP15.xar t530 7.2 ThinPro 7.2 SP15.xar t540 7.2 ThinPro 7.2 SP15.xar t628 7.2 ThinPro 7.2 SP15.xar t630 7.2 ThinPro 7.2 SP15.xar t638 7.2 ThinPro 7.2 SP15.xar t640 7.2 ThinPro 7.2 SP15.xar t730 7.2 ThinPro 7.2 SP15.xar t740 7.2 3. Installation ============================================================================ HP Recommends using HP Device Manager to install the addon. More details can be found in the HP Device Manager documentation. 4. Known Issues ============================================================================ There are no known issues. 5. Installation ============================================================================ 5.1 Installing update for ThinPro To install this addon: 1. Use the installer to deploy files to the server. 2. Copy the add-on from the appropriate directory to the "/tmp" directory. 3. On the device, run the command as follows: "xarinstall /tmp/ThinPro 7.2 SP15.xar" 4. Reboot the affected devices. Tip: This section describes the manual process of installing packages. To perform the recommended update method, use "Easy Update" in the ThinPro Control Panel. For detailed information see the "HP ThinPro Administrator's Guide". 6. Details ============================================================================ Modifications: - None Bug Fixes: - In domain user mode, user can edit the connection which administrator does not allow user to edit. Security Updates: - libinput vulnerability - CVE-2022-1215 - Rsyslog vulnerability - CVE-2022-24903 - LibTIFF vulnerability - CVE-2022-3970 - libxml2 vulnerabilities - CVE-2022-2309,CVE-2022-40303,CVE-2022-40304,CVE-2022-40304,CVE-2022-40303,CVE-2022-2309 - ca-certificates update - Heimdal vulnerability - CVE-2022-41916 - Python vulnerabilities - CVE-2022-37454,CVE-2022-45061,CVE-2022-45061,CVE-2022-37454 - usbredir vulnerability - CVE-2021-3700 - FreeRADIUS vulnerabilities - CVE-2019-17185,CVE-2022-41860,CVE-2022-41861,CVE-2019-17185,CVE-2022-41860,CVE-2022-41861 - Libksba vulnerability - CVE-2022-47629 - curl vulnerabilities - CVE-2022-43551,CVE-2022-43552,CVE-2022-43551,CVE-2022-43552 - w3m vulnerability - CVE-2022-38223 - Net-SNMP vulnerabilities - CVE-2022-44792,CVE-2022-44793 - Heimdal vulnerabilities - CVE-2021-44758,CVE-2022-3437,CVE-2022-42898,CVE-2022-44640,CVE-2022-42898,CVE-2022-44640,CVE-2021-44758,CVE-2022-3437 - libXpm vulnerabilities - CVE-2022-44617,CVE-2022-46285,CVE-2022-4883,CVE-2022-46285,CVE-2022-44617,CVE-2022-4883 - Sudo vulnerabilities - CVE-2023-22809,CVE-2022-33070,CVE-2023-22809,CVE-2022-33070 - PAM vulnerability - CVE-2022-28321 - Privoxy vulnerabilities - CVE-2021-44540,CVE-2021-44543,CVE-2021-44540,CVE-2021-44543 - OpenSSL vulnerabilities - CVE-2023-0286,CVE-2022-4203,CVE-2022-4304,CVE-2022-4450,CVE-2023-0215,CVE-2023-0216,CVE-2023-0217,CVE-2023-0401,CVE-2023-0217,CVE-2022-4304,CVE-2023-0215,CVE-2022-4450,CVE-2023-0286,CVE-2023-0401,CVE-2022-4203,CVE-2023-0216 - Heimdal vulnerabilities - CVE-2022-45142 - apr-util vulnerability - CVE-2022-25147 - NSS vulnerabilities - CVE-2022-3479,CVE-2023-0767,CVE-2022-3479,CVE-2023-0767 - curl vulnerabilities - CVE-2023-23914,CVE-2023-23915,CVE-2023-23916,CVE-2023-23915,CVE-2023-23914,CVE-2023-23916 - tar vulnerability - CVE-2022-48303 - Python vulnerability - CVE-2022-37454,CVE-2022-37454 - LibTIFF vulnerabilities - CVE-2023-0795,CVE-2023-0796,CVE-2023-0797,CVE-2023-0798,CVE-2023-0799,CVE-2023-0800,CVE-2023-0801,CVE-2023-0802,CVE-2023-0803,CVE-2023-0804,CVE-2023-0802,CVE-2023-0796,CVE-2023-0803,CVE-2023-0799,CVE-2023-0800,CVE-2023-0801,CVE-2023-0798,CVE-2023-0795,CVE-2023-0797,CVE-2023-0804 7. Additional Notes ============================================================================ There are no additional notes. 8. Release History ============================================================================ 2023-05-05 Package version 15.3 - First official installer release 9. Contact Information ============================================================================ For contact and support information, refer to: http://www.hp.com/go/thinclient