~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Service Pack 5 for ThinPro 8.0 5.2 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 1. Service Pack 5 for ThinPro 8.0 ============================================================================ HP announces the service pack 'Service Pack 5 for ThinPro 8.0'. 2. Support Matrix ============================================================================ Package Platform Image ---------------------------------------------------------------------------- ThinPro 8.0 SP5.xar mt21 8.0 ThinPro 8.0 SP5.xar mt22 8.0 ThinPro 8.0 SP5.xar mt32 8.0 ThinPro 8.0 SP5.xar mt440 8.0 ThinPro 8.0 SP5.xar mt45 8.0 ThinPro 8.0 SP5.xar mt46 8.0 ThinPro 8.0 SP5.xar mt645 8.0 ThinPro 8.0 SP5.xar t430 8.0 ThinPro 8.0 SP5.xar t530 8.0 ThinPro 8.0 SP5.xar t540 8.0 ThinPro 8.0 SP5.xar t550 8.0 ThinPro 8.0 SP5.xar t630 8.0 ThinPro 8.0 SP5.xar t638 8.0 ThinPro 8.0 SP5.xar t640 8.0 ThinPro 8.0 SP5.xar t655 8.0 ThinPro 8.0 SP5.xar t730 8.0 ThinPro 8.0 SP5.xar t740 8.0 3. Installation ============================================================================ 3.1 HP Recommends using HP Device Manager to deploy the addon. More details can be found in the HP Device Manager documentation. 3.2 Manual Installing for ThinPro Service Pack Upgrade 1. Copy the add-on file from the appropriate directory to the "/tmp" directory. 2. On the device, run the command as follows: "xarinstall /tmp/<> 3. Reboot the device. 4. ThinPro 8.0 (T8X80029) Image Known Issues: ============================================================================ - ThinPro 8.0 image has a timing issue causing Service Pack Upgrades to intermittently fail. This has been corrected in the ThinPro 8.0 Service Pack 1 Recovery imgage, Service Pack 1 Upgrade and subsequent Service Packs. 5. Contact Information ============================================================================ For contact and support information, refer to: http://www.hp.com/go/thinclient 6. Details ============================================================================ SP5 (v5.2) Modifications: - Add AB Circle and ACS smart card reader drivers - Upgrade opensc-pkcs11 for ThinPro 8.0 Bug Fixes: - After join domain mode,set 'switch to user action' to none in Customization Center,switch to user mode,TC will still log out - Taskbar inaccessible in TP8.0sp2.5 on HV Client 2206 and 2209 when launching full screen published application. - In domain user mode, user can edit the connection which administrator does not allow user to edit. - In domain user mode, "Allow the user to launch/edit this connection" should be invisible in Connection Manager. - In domain mode, when authorizations for add connections are disabled in Customization Center, user still can create all connections from Start Menu in user mode. - Disabling Search Value in the Registry Disables the Start Menu - When connected to HP USB-C Dock G5, numLock does not work at start up on USB keyboard via BIOS settings or in ThinPro 8 Security Updates: - FLAC vulnerabilities - CVE-2017-6888,CVE-2020-0499,CVE-2021-0561,CVE-2017-6888,CVE-2020-0499,CVE-2021-0561 - Expat vulnerability - CVE-2022-43680,CVE-2022-43680 - JBIG-KIT vulnerability - CVE-2017-9937 - shadow vulnerability - CVE-2013-4235 - LibTIFF vulnerability - CVE-2022-3970 - libxml2 vulnerabilities - CVE-2022-2309,CVE-2022-40303,CVE-2022-40304,CVE-2022-40304,CVE-2022-40303,CVE-2022-2309 - ca-certificates update - Heimdal vulnerability - CVE-2022-41916 - Python vulnerabilities - CVE-2022-37454,CVE-2022-45061,CVE-2022-45061,CVE-2022-37454 - Pillow vulnerabilities - CVE-2022-24303,CVE-2022-45198,CVE-2022-24303,CVE-2022-45198 - Libksba vulnerability - CVE-2022-47629 - Net-SNMP vulnerabilities - CVE-2022-44792,CVE-2022-44793 - libXpm vulnerabilities - CVE-2022-44617,CVE-2022-46285,CVE-2022-4883,CVE-2022-46285,CVE-2022-44617,CVE-2022-4883 - urllib3 vulnerability - CVE-2021-33503 - Setuptools vulnerability - CVE-2022-40897 - MySQL vulnerabilities - CVE-2023-21869,CVE-2023-21878,CVE-2023-21880,CVE-2023-21836,CVE-2023-21840,CVE-2022-32221,CVE-2023-21873,CVE-2023-21883,CVE-2023-21877,CVE-2023-21871,CVE-2023-21882,CVE-2023-21870,CVE-2023-21876,CVE-2023-21867,CVE-2023-21881,CVE-2023-21863,CVE-2023-21887,CVE-2023-21879,CVE-2023-21868,CVE-2023-21875 - PAM vulnerability - CVE-2022-28321 - Bind vulnerabilities - CVE-2022-3094,CVE-2022-3736,CVE-2022-3924,CVE-2022-3094,CVE-2022-3924,CVE-2022-3736 - OpenSSL vulnerabilities - CVE-2023-0286,CVE-2022-4203,CVE-2022-4304,CVE-2022-4450,CVE-2023-0215,CVE-2023-0216,CVE-2023-0217,CVE-2023-0401,CVE-2023-0217,CVE-2022-4304,CVE-2023-0215,CVE-2022-4450,CVE-2023-0286,CVE-2023-0401,CVE-2022-4203,CVE-2023-0216 - Heimdal vulnerabilities - CVE-2022-45142 - apr-util vulnerability - CVE-2022-25147 - NSS vulnerabilities - CVE-2022-3479,CVE-2023-0767,CVE-2022-3479,CVE-2023-0767 - curl vulnerabilities - CVE-2023-23914,CVE-2023-23915,CVE-2023-23916,CVE-2023-23915,CVE-2023-23914,CVE-2023-23916 - Python vulnerabilities - CVE-2015-20107,CVE-2021-28861,CVE-2022-37454,CVE-2022-42919,CVE-2022-45061,CVE-2023-24329,CVE-2022-42919,CVE-2022-37454,CVE-2021-28861,CVE-2022-45061,CVE-2015-20107,CVE-2023-24329 - GnuTLS vulnerability - CVE-2023-0361 - tar vulnerability - CVE-2022-48303 7. Additional Notes ============================================================================ There are no additional notes. 8. Release History ============================================================================ 2023-05-05 Package version 5.2 - First official installer release 9. Contact Information ============================================================================ For contact and support information, refer to: http://www.hp.com/go/thinclient