~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Service Pack 8 for ThinPro 8.0 8.3 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 1. Service Pack 8 for ThinPro 8.0 ============================================================================ HP announces the service pack 'Service Pack 8 for ThinPro 8.0'. 2. Support Matrix ============================================================================ Package Platform Image ---------------------------------------------------------------------------- ThinPro8.0_SP-8.3-signed.xar PC 8.0 ThinPro8.0_SP-8.3-signed.xar mt21 8.0 ThinPro8.0_SP-8.3-signed.xar mt22 8.0 ThinPro8.0_SP-8.3-signed.xar mt32 8.0 ThinPro8.0_SP-8.3-signed.xar mt440 8.0 ThinPro8.0_SP-8.3-signed.xar mt45 8.0 ThinPro8.0_SP-8.3-signed.xar mt46 8.0 ThinPro8.0_SP-8.3-signed.xar mt645 8.0 ThinPro8.0_SP-8.3-signed.xar t430 8.0 ThinPro8.0_SP-8.3-signed.xar t530 8.0 ThinPro8.0_SP-8.3-signed.xar t540 8.0 ThinPro8.0_SP-8.3-signed.xar t550 8.0 ThinPro8.0_SP-8.3-signed.xar t630 8.0 ThinPro8.0_SP-8.3-signed.xar t638 8.0 ThinPro8.0_SP-8.3-signed.xar t640 8.0 ThinPro8.0_SP-8.3-signed.xar t655 8.0 ThinPro8.0_SP-8.3-signed.xar t730 8.0 ThinPro8.0_SP-8.3-signed.xar t740 8.0 3. What's New ============================================================================ SP8 (v8.3) - Fixed some untranslated text items - Fixed Bluetooth wakeup issue - Adjusted default volume with 3.5mm headset and internal speakers - Fixed slow decryption speed with certain ThinClient/SSD models - Fixed several wrong icon on desktop - Fixed Export/Restore to include SCEP certs/display settings/printer/sound settings - Fixed slow DNS query when NTP is not configured properly - Fixed second monitor configuration not persisted issue - Fixed image deployment false error message when running under a domain network - Fixed wifi network setting to allow password change - Restore keyboard activation of screen unlock dialog - Enforce user password entry when "Local user must log in" setting is enabled - Fixed device wake up issue when using Bluetooth peripherals - Fixed freerdp2 "can't apply profile" issue - Fixed some spurrious error during disk encryption operations - Fixed IBus display language issue while the system is in domain join mode - AOM vulnerabilities :: CVE-2020-36130, CVE-2020-36131, CVE-2020-36133, CVE-2020-36135, CVE-2021-30473, CVE-2021-30474, CVE-2021-30475 - Avahi vulnerabilities :: CVE-2023-38469, CVE-2023-38470, CVE-2023-38471, CVE-2023-38472, CVE-2023-38473 - Bind vulnerabilities :: CVE-2023-3341, CVE-2023-4236 - BlueZ vulnerabilities :: CVE-2023-45866 - CUPS vulnerabilities :: CVE-2023-32360 - FAAD2 vulnerabilities :: CVE-2021-32272, CVE-2021-32273, CVE-2021-32274, CVE-2021-32276, CVE-2021-32277, CVE-2021-32278, CVE-2023-38857, CVE-2023-38858 - FFmpeg vulnerabilities :: CVE-2020-22024, CVE-2020-22039, CVE-2020-22040, CVE-2020-22043, CVE-2020-22051, CVE-2021-28429 - FLAC vulnerabilities :: CVE-2020-22219 - GLib vulnerabilities :: CVE-2023-29499, CVE-2023-32611, CVE-2023-32636, CVE-2023-32643, CVE-2023-32665 - GNU C Library vulnerabilities :: CVE-2023-4806, CVE-2023-4813, CVE-2023-5156 - GNU Tar vulnerabilities :: CVE-2023-39804 - GNU binutils vulnerabilities :: CVE-2020-19726, CVE-2021-46174, CVE-2022-35205, CVE-2022-38533, CVE-2022-4285 - GRUB2 vulnerabilities :: CVE-2021-3695, CVE-2021-3696, CVE-2021-3697, CVE-2021-3981, CVE-2022-28733, CVE-2022-28734, CVE-2022-28735, CVE-2022-28736, CVE-2022-28737, CVE-2022-3775 - GStreamer Bad Plugins vulnerabilities :: CVE-2023-37329, CVE-2023-40474, CVE-2023-40475, CVE-2023-40476, CVE-2023-44429, CVE-2023-44446 - GStreamer Base Plugins vulnerabilities :: CVE-2023-37327, CVE-2023-37328 - GStreamer Good Plugins vulnerabilities :: CVE-2023-37327 - Ghostscript vulnerabilities :: CVE-2023-38559 - GnuTLS vulnerabilities :: CVE-2023-5981 - Kerberos vulnerabilities :: CVE-2023-36054 - LibTIFF vulnerabilities :: CVE-2022-48281, CVE-2023-25433, CVE-2023-26965, CVE-2023-26966, CVE-2023-2731, CVE-2023-2908, CVE-2023-3316, CVE-2023-3618, CVE-2023-38288, CVE-2023-38289 - MySQL vulnerabilities :: CVE-2023-22032, CVE-2023-22059, CVE-2023-22064, CVE-2023-22066, CVE-2023-22068, CVE-2023-22070, CVE-2023-22078, CVE-2023-22079, CVE-2023-22084, CVE-2023-22092, CVE-2023-22097, CVE-2023-22103, CVE-2023-22112, CVE-2023-22114 - OpenSSH vulnerabilities :: CVE-2023-38408 - OpenSSL vulnerabilities :: CVE-2023-3446, CVE-2023-3817 - Perl vulnerabilities :: CVE-2022-48522, CVE-2023-47038 - Python vulnerabilities :: CVE-2021-4189, CVE-2022-0391 - Samba vulnerabilities :: CVE-2022-2127, CVE-2023-3347, CVE-2023-34966, CVE-2023-34967, CVE-2023-34968 - Traceroute vulnerabilities :: CVE-2023-46316 - Vim vulnerabilities :: CVE-2022-2182, CVE-2022-2208, CVE-2022-2210, CVE-2022-2231, CVE-2022-2257, CVE-2022-2264, CVE-2022-2284, CVE-2022-2285, CVE-2022-2286, CVE-2022-2287, CVE-2022-2289 - X.Org X Server vulnerabilities :: CVE-2023-5367, CVE-2023-5380 - curl vulnerabilities :: CVE-2023-38545, CVE-2023-38546 - gawk vulnerabilities :: CVE-2023-4156 - librsvg vulnerabilities :: CVE-2023-38633 - libsndfile vulnerabilities :: CVE-2022-33065 - libssh vulnerabilities :: CVE-2023-48795 - libssh2 vulnerabilities :: CVE-2020-22218 - libwebp vulnerabilities :: CVE-2023-4863 - nghttp2 vulnerabilities :: CVE-2023-44487 - poppler vulnerabilities :: CVE-2022-27337, CVE-2023-34872 - procps-ng vulnerabilities :: CVE-2023-4016 - python-cryptography vulnerabilities :: CVE-2023-23931, CVE-2023-49083 - urllib3 vulnerabilities :: CVE-2018-25091, CVE-2023-43804, CVE-2023-45803 - sudo vulnerabilities :: sudoers config doesn't cleanup the environment properly which may led to escalation of priviledge attacks 4. Documentation Set ============================================================================ There is no additional documentation associated with this softpaq. 5. Installation ============================================================================ 5.1 Installing update for ThinPro To install this addon: 1. Use the installer to deploy files to the server. 2. Copy the add-on from the appropriate directory to the "/tmp" directory. 3. On the device, run the command as follows: "xarinstall /tmp/ThinPro8.0_SP-8.3-signed.xar" 4. Reboot the affected devices. Tip: This section describes the manual process of installing packages. To perform the recommended update method, use "Easy Update" in the ThinPro Control Panel. For detailed information see the "HP ThinPro Administrator's Guide". 6. Known Issues ============================================================================ There are no known issues. 7. Additional Notes ============================================================================ There are no additional notes. 8. Release History ============================================================================ 2023-12-20 Package version 8.3 - First official installer release SP7 (v7.3) Bug Fixes: - Sometimes double touch action cannot take effect on ELO 1529 touch screen. - Wallpaper style "center" and "tile" are not applied properly - Display region will overlap under certain operations with multiple external monitors connected - Touchscreen aren't always setup properly - Fixed typo in NTP configuration file - Fixed DNS configuration handling when the device is added to the domain Security Updates: - grub2 vulnerabilities - CVE-2022-21894, CVE-2021-3695, CVE-2021-3696, CVE-2021-3697, CVE-2021-3981, CVE-2022-28733, CVE-2022-28734, CVE-2022-28735, CVE-2022-28736, CVE-2022-28737, CVE-2022-3775 - WebKitGTK vulnerabilities - CVE-2023-27932,CVE-2023-25358,CVE-2023-28205,CVE-2022-32885,CVE-2022-0108,CVE-2023-27954 - MySQL vulnerabilities - CVE-2023-21940,CVE-2023-21953,CVE-2023-21982,CVE-2023-21920,CVE-2023-21911,CVE-2023-21933,CVE-2023-21946,CVE-2023-21955,CVE-2023-21966,CVE-2023-21912,CVE-2023-21980,CVE-2023-21972,CVE-2023-21935,CVE-2023-21977,CVE-2023-21947,CVE-2023-21929,CVE-2023-21962,CVE-2023-21919,CVE-2023-21976,CVE-2023-21945 - FreeType vulnerability - CVE-2023-2004 - Ceph vulnerabilities - CVE-2021-3979,CVE-2022-0670,CVE-2022-3650,CVE-2022-3854,CVE-2021-3979,CVE-2022-3854,CVE-2022-3650,CVE-2022-0670 - libwebp vulnerability - CVE-2023-1999 - cups-filters vulnerability - CVE-2023-24805,CVE-2023-32324,CVE-2023-34241 - runC vulnerabilities - CVE-2023-25809,CVE-2023-27561,CVE-2023-28642,CVE-2023-28642,CVE-2023-27561,CVE-2023-25809 - GNU binutils vulnerabilities - CVE-2023-1579,CVE-2023-1972,CVE-2023-25584,CVE-2023-25585,CVE-2023-25588,CVE-2023-1972,CVE-2021-45078 - OpenSSL vulnerabilities - CVE-2023-2650,CVE-2023-1255,CVE-2023-1255,CVE-2023-2650 - Linux kernel vulnerabilities - CVE-2023-1076,CVE-2023-1077,CVE-2023-1078,CVE-2023-1079,CVE-2023-1380,CVE-2023-1670,CVE-2023-1859,CVE-2023-1998,CVE-2023-2612,CVE-2023-2985,CVE-2023-25012,CVE-2023-30456,CVE-2023-31436,CVE-2023-32233, - Avahi vulnerability - CVE-2023-1981 - Perl vulnerability - CVE-2023-31484 - libssh vulnerabilities - CVE-2023-1667,CVE-2023-2283,CVE-2023-1667,CVE-2023-2283 - Python vulnerability - CVE-2023-24329,CVE-2023-24329 - nghttp2 vulnerability - CVE-2020-11080 - Vim vulnerabilities - CVE-2023-2426,CVE-2023-2609,CVE-2023-2610,CVE-2023-2609,CVE-2023-2610,CVE-2023-2426 - Requests vulnerability - CVE-2023-32681 - libcap2 vulnerabilities - CVE-2023-2602,CVE-2023-2603,CVE-2023-2602,CVE-2023-2603 - GLib vulnerabilities - CVE-2023-32636,CVE-2023-32665,CVE-2023-24593,CVE-2023-32611,CVE-2023-29499,CVE-2023-25180,CVE-2023-32643 - c-ares vulnerabilities - CVE-2023-31130,CVE-2023-32067,CVE-2023-31130,CVE-2023-32067 - libx11 vulnerability - CVE-2023-3138 - Bind vulnerabilities - CVE-2023-2828,CVE-2023-2911,CVE-2023-2911,CVE-2023-2828 - Ghostscript vulnerability - CVE-2023-36664 - GStreamer Good Plugins vulnerability - CVE-2023-37327,CVE-2023-37327 - GStreamer Base Plugins vulnerabilities - CVE-2023-37327,CVE-2023-37328,CVE-2023-37328,CVE-2023-37327 - poppler vulnerabilities - CVE-2022-27337,CVE-2023-34872,CVE-2022-27337,CVE-2023-34872 SP6 (v6.2) Security Updates: - Linux kernel vulnerability - CVE-2023-0459,CVE-2023-1075,CVE-2023-1078,CVE-2023-1118,CVE-2023-1513,CVE-2023-1829,CVE-2023-1872,CVE-2023-2162,CVE-2022-3707,CVE-2023-20938,CVE-2022-27672,CVE-2023-32269 - ncurses vulnerabilities - CVE-2019-17594,CVE-2019-17595,CVE-2021-39537,CVE-2022-29458,CVE-2023-29491 - ca-certificates update SP5 (v5.2) Modifications: - Add AB Circle and ACS smart card reader drivers - Upgrade opensc-pkcs11 for ThinPro 8.0 Bug Fixes: - After join domain mode,set 'switch to user action' to none in Customization Center,switch to user mode,TC will still log out - Taskbar inaccessible in TP8.0sp2.5 on HV Client 2206 and 2209 when launching full screen published application. - In domain user mode, user can edit the connection which administrator does not allow user to edit. - In domain user mode, "Allow the user to launch/edit this connection" should be invisible in Connection Manager. - In domain mode, when authorizations for add connections are disabled in Customization Center, user still can create all connections from Start Menu in user mode. - Disabling Search Value in the Registry Disables the Start Menu - When connected to HP USB-C Dock G5, numLock does not work at start up on USB keyboard via BIOS settings or in ThinPro 8 Security Updates: - FLAC vulnerabilities - CVE-2017-6888,CVE-2020-0499,CVE-2021-0561,CVE-2017-6888,CVE-2020-0499,CVE-2021-0561 - Expat vulnerability - CVE-2022-43680,CVE-2022-43680 - JBIG-KIT vulnerability - CVE-2017-9937 - shadow vulnerability - CVE-2013-4235 - LibTIFF vulnerability - CVE-2022-3970 - libxml2 vulnerabilities - CVE-2022-2309,CVE-2022-40303,CVE-2022-40304,CVE-2022-40304,CVE-2022-40303,CVE-2022-2309 - ca-certificates update - Heimdal vulnerability - CVE-2022-41916 - Python vulnerabilities - CVE-2022-37454,CVE-2022-45061,CVE-2022-45061,CVE-2022-37454 - Pillow vulnerabilities - CVE-2022-24303,CVE-2022-45198,CVE-2022-24303,CVE-2022-45198 - Libksba vulnerability - CVE-2022-47629 - Net-SNMP vulnerabilities - CVE-2022-44792,CVE-2022-44793 - libXpm vulnerabilities - CVE-2022-44617,CVE-2022-46285,CVE-2022-4883,CVE-2022-46285,CVE-2022-44617,CVE-2022-4883 - urllib3 vulnerability - CVE-2021-33503 - Setuptools vulnerability - CVE-2022-40897 - MySQL vulnerabilities - CVE-2023-21869,CVE-2023-21878,CVE-2023-21880,CVE-2023-21836,CVE-2023-21840,CVE-2022-32221,CVE-2023-21873,CVE-2023-21883,CVE-2023-21877,CVE-2023-21871,CVE-2023-21882,CVE-2023-21870,CVE-2023-21876,CVE-2023-21867,CVE-2023-21881,CVE-2023-21863,CVE-2023-21887,CVE-2023-21879,CVE-2023-21868,CVE-2023-21875 - PAM vulnerability - CVE-2022-28321 - Bind vulnerabilities - CVE-2022-3094,CVE-2022-3736,CVE-2022-3924,CVE-2022-3094,CVE-2022-3924,CVE-2022-3736 - OpenSSL vulnerabilities - CVE-2023-0286,CVE-2022-4203,CVE-2022-4304,CVE-2022-4450,CVE-2023-0215,CVE-2023-0216,CVE-2023-0217,CVE-2023-0401,CVE-2023-0217,CVE-2022-4304,CVE-2023-0215,CVE-2022-4450,CVE-2023-0286,CVE-2023-0401,CVE-2022-4203,CVE-2023-0216 - Heimdal vulnerabilities - CVE-2022-45142 - apr-util vulnerability - CVE-2022-25147 - NSS vulnerabilities - CVE-2022-3479,CVE-2023-0767,CVE-2022-3479,CVE-2023-0767 - curl vulnerabilities - CVE-2023-23914,CVE-2023-23915,CVE-2023-23916,CVE-2023-23915,CVE-2023-23914,CVE-2023-23916 - Python vulnerabilities - CVE-2015-20107,CVE-2021-28861,CVE-2022-37454,CVE-2022-42919,CVE-2022-45061,CVE-2023-24329,CVE-2022-42919,CVE-2022-37454,CVE-2021-28861,CVE-2022-45061,CVE-2015-20107,CVE-2023-24329 - GnuTLS vulnerability - CVE-2023-0361 - tar vulnerability - CVE-2022-48303 SP4 (v4.3) Bug Fixes: - Amman time zone shows UTC+2:00 instead of UTC+3:00 - HP t530 Thin Client Time and Date is displayed vertically when taskbar position is changed to the side - ThinPro PC Converter WiFi not detected on some HP Notebook PC including HP 255 G9 - The HP helper scripts for the Imprivata client are not able to parse the version of the Citrix Workspace app since 22.09 and newer Security Updates: - curl vulnerabilities - CVE-2022-43551,CVE-2022-43552,CVE-2022-43551,CVE-2022-43552 - Heimdal vulnerabilities - CVE-2021-44758,CVE-2022-3437,CVE-2022-42898,CVE-2022-44640,CVE-2022-42898,CVE-2022-44640,CVE-2021-44758,CVE-2022-3437 - Vim vulnerabilities - CVE-2022-0392,CVE-2022-0417,CVE-2022-0392,CVE-2022-0417 - Sudo vulnerabilities - CVE-2023-22809,CVE-2022-33070,CVE-2023-22809,CVE-2022-33070 - Linux kernel vulnerability - CVE-2021-3759 - Linux kernel vulnerabilities - CVE-2019-19449,CVE-2020-36385,CVE-2021-3428,CVE-2021-34556,CVE-2021-35477,CVE-2021-3739,CVE-2021-3743,CVE-2021-3753,CVE-2021-3759,CVE-2021-42252,CVE-2020-36385,CVE-2021-42252,CVE-2021-3739,CVE-2021-3428,CVE-2019-19449,CVE-2021-34556,CVE-2021-3753,CVE-2021-3743,CVE-2021-35477,CVE-2021-3759 - Linux kernel vulnerabilities - CVE-2019-19449,CVE-2020-36385,CVE-2021-3428,CVE-2021-34556,CVE-2021-35477,CVE-2021-3739,CVE-2021-3743,CVE-2021-3753,CVE-2021-3759,CVE-2021-3759,CVE-2021-3428,CVE-2021-3743,CVE-2021-34556,CVE-2021-3739,CVE-2021-3753,CVE-2021-35477,CVE-2020-36385,CVE-2019-19449 - Linux kernel vulnerabilities - CVE-2021-3655,CVE-2021-37159,CVE-2021-3744,CVE-2021-3764,CVE-2021-37159,CVE-2021-3764,CVE-2021-3744,CVE-2021-3655 - Linux kernel vulnerabilities - CVE-2021-3655,CVE-2021-3744,CVE-2021-3764,CVE-2021-42252,CVE-2021-43057,CVE-2021-3655,CVE-2021-42252,CVE-2021-43057,CVE-2021-3744,CVE-2021-3764 - Linux kernel vulnerabilities - CVE-2021-3655,CVE-2021-3744,CVE-2021-3764,CVE-2021-42252,CVE-2021-3744,CVE-2021-3764,CVE-2021-42252,CVE-2021-3655 - Linux kernel vulnerabilities - CVE-2021-4002,CVE-2020-26541,CVE-2021-20321,CVE-2021-3760,CVE-2021-41864,CVE-2021-43056,CVE-2021-43389,CVE-2021-4002,CVE-2021-43389,CVE-2021-20321,CVE-2021-3760,CVE-2020-26541,CVE-2021-43056,CVE-2021-41864 - Linux kernel vulnerabilities - CVE-2021-4002,CVE-2021-20321,CVE-2021-3760,CVE-2021-41864,CVE-2021-43056,CVE-2021-43267,CVE-2021-43389,CVE-2021-43389,CVE-2021-4002,CVE-2021-43267,CVE-2021-41864,CVE-2021-43056,CVE-2021-20321,CVE-2021-3760 - Linux kernel vulnerability - CVE-2021-4204 - Linux kernel regression - CVE-2021-4002,CVE-2020-26541,CVE-2021-20321,CVE-2021-3760,CVE-2021-41864,CVE-2021-43056,CVE-2021-43389 - Linux kernel vulnerability - CVE-2022-0185 - Linux kernel vulnerabilities - CVE-2020-27820,CVE-2021-3640,CVE-2021-3752,CVE-2021-3772,CVE-2021-4001,CVE-2021-4090,CVE-2021-4093,CVE-2021-4202,CVE-2021-42327,CVE-2021-42739,CVE-2021-4001,CVE-2021-42739,CVE-2021-3772,CVE-2021-42327,CVE-2021-4093,CVE-2020-27820,CVE-2021-3752,CVE-2021-3640,CVE-2021-4090,CVE-2021-4202 - Linux kernel vulnerabilities - CVE-2021-3640,CVE-2021-3752,CVE-2021-42739,CVE-2021-3752,CVE-2021-3640,CVE-2021-42739 - Linux kernel regression - CVE-2021-3640,CVE-2021-3752,CVE-2021-42739 - Linux kernel vulnerabilities - CVE-2021-22600,CVE-2021-39685,CVE-2021-4083,CVE-2021-4155,CVE-2021-4202,CVE-2021-43975,CVE-2022-0330,CVE-2022-22942,CVE-2021-4202,CVE-2021-43975,CVE-2022-0330,CVE-2021-4155,CVE-2021-4083,CVE-2022-22942,CVE-2021-39685,CVE-2021-22600 - Linux kernel vulnerabilities - CVE-2021-22600,CVE-2021-39685,CVE-2021-4083,CVE-2021-4155,CVE-2021-4202,CVE-2021-43975,CVE-2022-0330,CVE-2022-22942,CVE-2021-43975,CVE-2021-22600,CVE-2021-39685,CVE-2022-0330,CVE-2021-4155,CVE-2022-22942,CVE-2021-4083,CVE-2021-4202 - Linux kernel vulnerabilities - CVE-2022-25636,CVE-2022-23960,CVE-2022-0001,CVE-2022-0002,CVE-2022-25636,CVE-2022-0001,CVE-2022-0002,CVE-2022-23960 - Linux kernel vulnerabilities - CVE-2022-25636,CVE-2022-23960,CVE-2022-0847,CVE-2022-0001,CVE-2022-0002,CVE-2022-23960,CVE-2022-0001,CVE-2022-0002,CVE-2022-0847,CVE-2022-25636 - Linux kernel vulnerabilities - CVE-2022-0492,CVE-2021-28711,CVE-2021-28712,CVE-2021-28713,CVE-2021-28714,CVE-2021-28715,CVE-2021-4135,CVE-2021-43976,CVE-2021-44733,CVE-2021-45095,CVE-2021-45480,CVE-2022-0435,CVE-2022-0516,CVE-2021-43976,CVE-2021-28712,CVE-2021-28715,CVE-2021-44733,CVE-2021-45480,CVE-2022-0435,CVE-2022-0516,CVE-2021-28711,CVE-2021-4135,CVE-2022-0492,CVE-2021-28713,CVE-2021-28714,CVE-2021-45095 - Linux kernel vulnerabilities - CVE-2022-23222,CVE-2022-0492,CVE-2021-28711,CVE-2021-28712,CVE-2021-28713,CVE-2021-28714,CVE-2021-28715,CVE-2021-39685,CVE-2021-39698,CVE-2021-4135,CVE-2021-4197,CVE-2021-43975,CVE-2021-44733,CVE-2021-45095,CVE-2021-45402,CVE-2021-45480,CVE-2022-0264,CVE-2022-0382,CVE-2022-0435,CVE-2022-0516,CVE-2022-0742,CVE-2021-45480,CVE-2021-28712,CVE-2021-39698,CVE-2021-45095,CVE-2022-0264,CVE-2021-4197,CVE-2021-28711,CVE-2021-28714,CVE-2022-0435,CVE-2021-28715,CVE-2021-4135,CVE-2022-0742,CVE-2022-0382,CVE-2021-45402,CVE-2022-23222,CVE-2022-0516,CVE-2021-44733,CVE-2021-39685,CVE-2021-43975,CVE-2022-0492,CVE-2021-28713 - Linux kernel vulnerabilities - CVE-2022-1055,CVE-2022-27666,CVE-2022-27666,CVE-2022-1055 - Linux kernel vulnerabilities - CVE-2022-1055,CVE-2022-27666,CVE-2022-1055,CVE-2022-27666 - Linux kernel vulnerabilities - CVE-2022-23222,CVE-2022-1055,CVE-2022-0492,CVE-2021-28711,CVE-2021-28712,CVE-2021-28713,CVE-2021-28714,CVE-2021-28715,CVE-2021-39685,CVE-2021-39698,CVE-2021-4135,CVE-2021-4197,CVE-2021-43975,CVE-2021-44733,CVE-2021-45095,CVE-2021-45402,CVE-2021-45480,CVE-2022-0264,CVE-2022-0382,CVE-2022-0435,CVE-2022-0516,CVE-2022-0742,CVE-2022-27666,CVE-2021-28713,CVE-2022-0492,CVE-2021-28711,CVE-2022-0264,CVE-2021-4135,CVE-2022-27666,CVE-2021-4197,CVE-2021-45402,CVE-2022-0742,CVE-2022-0435,CVE-2021-39685,CVE-2021-28712,CVE-2021-39698,CVE-2022-0382,CVE-2021-28714,CVE-2021-45480,CVE-2022-1055,CVE-2021-28715,CVE-2021-44733,CVE-2021-45095,CVE-2022-0516,CVE-2021-43975,CVE-2022-23222 - Linux kernel vulnerabilities - CVE-2022-0617,CVE-2022-24448,CVE-2022-24959,CVE-2022-24448,CVE-2022-24959,CVE-2022-0617 - Linux kernel vulnerabilities - CVE-2022-1015,CVE-2021-43976,CVE-2021-44879,CVE-2022-0617,CVE-2022-1016,CVE-2022-24448,CVE-2022-26878,CVE-2022-24959,CVE-2022-1015,CVE-2022-1016,CVE-2022-0617,CVE-2021-44879,CVE-2021-43976,CVE-2022-24959,CVE-2022-24448,CVE-2022-26878 - Linux kernel vulnerabilities - CVE-2021-26401,CVE-2022-20008,CVE-2022-25258,CVE-2022-25375,CVE-2022-26490,CVE-2022-26966,CVE-2022-27223,CVE-2022-29156,CVE-2022-27223,CVE-2021-26401,CVE-2022-25258,CVE-2022-26490,CVE-2022-26966,CVE-2022-20008,CVE-2022-29156,CVE-2022-25375 - Linux kernel vulnerabilities - CVE-2020-27820,CVE-2021-26401,CVE-2022-1016,CVE-2022-20008,CVE-2022-25258,CVE-2022-25375,CVE-2022-26490,CVE-2022-27223,CVE-2022-1016,CVE-2022-20008,CVE-2022-25258,CVE-2020-27820,CVE-2022-25375,CVE-2022-26490,CVE-2022-27223,CVE-2021-26401 - Linux kernel vulnerability - CVE-2022-29581 - Linux kernel vulnerabilities - CVE-2022-29581,CVE-2022-1116,CVE-2022-30594,CVE-2022-29581,CVE-2022-1116,CVE-2022-30594 - Linux kernel vulnerabilities - CVE-2022-29581,CVE-2022-30594,CVE-2022-29581,CVE-2022-30594 - Linux kernel vulnerabilities - CVE-2022-29581,CVE-2022-30594,CVE-2022-29581,CVE-2022-30594 - Linux kernel vulnerabilities - CVE-2022-29581,CVE-2022-1116,CVE-2022-30594,CVE-2022-29581,CVE-2022-1116,CVE-2022-30594 - Linux kernel vulnerabilities - CVE-2022-21499,CVE-2022-1966,CVE-2022-1158,CVE-2022-1972,CVE-2022-24958,CVE-2022-28390,CVE-2022-1966,CVE-2022-21499,CVE-2022-1158,CVE-2022-1972,CVE-2022-24958,CVE-2022-28390 - Linux kernel vulnerabilities - CVE-2022-21499,CVE-2022-1966,CVE-2021-3772,CVE-2021-4197,CVE-2022-1011,CVE-2022-1158,CVE-2022-1198,CVE-2022-1353,CVE-2022-1516,CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042,CVE-2022-24958,CVE-2022-26966,CVE-2022-28356,CVE-2022-28389,CVE-2022-28390,CVE-2022-28389,CVE-2022-24958,CVE-2022-28356,CVE-2022-23037,CVE-2022-23042,CVE-2022-1198,CVE-2022-1011,CVE-2021-4197,CVE-2022-1353,CVE-2022-23038,CVE-2022-1158,CVE-2022-23036,CVE-2022-26966,CVE-2022-28390,CVE-2022-23040,CVE-2022-1516,CVE-2022-23041,CVE-2021-3772,CVE-2022-1966,CVE-2022-21499,CVE-2022-23039 - Linux kernel vulnerabilities - CVE-2022-21123,CVE-2022-21125,CVE-2022-21166,CVE-2022-21123,CVE-2022-21166,CVE-2022-21125 - Linux kernel vulnerability - CVE-2022-28388 - Linux kernel vulnerabilities - CVE-2022-1195,CVE-2022-1199,CVE-2022-1204,CVE-2022-1205,CVE-2022-1789,CVE-2022-33981,CVE-2022-1199,CVE-2022-1205,CVE-2022-1195,CVE-2022-33981,CVE-2022-1204,CVE-2022-1789 - Linux kernel vulnerabilities - CVE-2022-1195,CVE-2022-1199,CVE-2022-1204,CVE-2022-1205,CVE-2022-1789,CVE-2022-28388,CVE-2022-33981,CVE-2022-1199,CVE-2022-1195,CVE-2022-1205,CVE-2022-1789,CVE-2022-33981,CVE-2022-28388,CVE-2022-1204 - Linux kernel vulnerabilities - CVE-2022-1679,CVE-2022-28893,CVE-2022-34918,CVE-2022-1652,CVE-2022-1679,CVE-2022-28893,CVE-2022-1652,CVE-2022-34918 - Linux kernel vulnerabilities - CVE-2022-2588,CVE-2022-2586,CVE-2022-0494,CVE-2022-1048,CVE-2022-1652,CVE-2022-1679,CVE-2022-1734,CVE-2022-1974,CVE-2022-1975,CVE-2022-28893,CVE-2022-34918,CVE-2022-1048,CVE-2022-1734,CVE-2022-0494,CVE-2022-1974,CVE-2022-28893,CVE-2022-1975,CVE-2022-34918,CVE-2022-2586,CVE-2022-2588,CVE-2022-1652,CVE-2022-1679 - Linux kernel vulnerabilities - CVE-2022-2588,CVE-2022-2586,CVE-2022-2585,CVE-2022-1652,CVE-2022-1679,CVE-2022-28893,CVE-2022-29900,CVE-2022-29901,CVE-2022-34918,CVE-2022-2586,CVE-2022-29901,CVE-2022-34918,CVE-2022-29900,CVE-2022-2585,CVE-2022-2588,CVE-2022-1652,CVE-2022-1679,CVE-2022-28893 - Linux kernel vulnerabilities - CVE-2022-2588,CVE-2022-2586,CVE-2022-2585,CVE-2022-29900,CVE-2022-29901,CVE-2022-2588,CVE-2022-2585,CVE-2022-29901,CVE-2022-29900,CVE-2022-2586 - Linux kernel vulnerabilities - CVE-2021-33061,CVE-2021-33656,CVE-2021-33656,CVE-2021-33061 - Linux kernel vulnerabilities - CVE-2021-33061,CVE-2021-33656,CVE-2021-33656,CVE-2021-33061 - Linux kernel vulnerabilities - CVE-2021-33061,CVE-2022-1012,CVE-2022-1729,CVE-2022-1852,CVE-2022-1943,CVE-2022-1973,CVE-2022-2503,CVE-2022-2873,CVE-2022-2959,CVE-2022-1973,CVE-2022-1729,CVE-2022-1852,CVE-2022-2959,CVE-2021-33061,CVE-2022-1943,CVE-2022-2873,CVE-2022-1012,CVE-2022-2503 - Linux kernel vulnerabilities - CVE-2021-33655,CVE-2022-2318,CVE-2022-26365,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742,CVE-2022-33743,CVE-2022-33744,CVE-2022-34494,CVE-2022-34495,CVE-2022-36946,CVE-2022-36946,CVE-2022-26365,CVE-2022-34495,CVE-2021-33655,CVE-2022-2318,CVE-2022-33744,CVE-2022-33742,CVE-2022-34494,CVE-2022-33741,CVE-2022-33743,CVE-2022-33740 - Linux kernel vulnerabilities - CVE-2021-33655,CVE-2022-1012,CVE-2022-32296,CVE-2022-1729,CVE-2022-2503,CVE-2022-36946,CVE-2022-36946,CVE-2022-2503,CVE-2022-1012,CVE-2022-1729,CVE-2022-32296,CVE-2021-33655 - Linux kernel vulnerabilities - CVE-2021-4159,CVE-2022-20369,CVE-2022-2318,CVE-2022-26365,CVE-2022-26373,CVE-2022-3176,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742,CVE-2022-33744,CVE-2022-36879,CVE-2022-33741,CVE-2021-4159,CVE-2022-33740,CVE-2022-20369,CVE-2022-33744,CVE-2022-26373,CVE-2022-3176,CVE-2022-33742,CVE-2022-36879,CVE-2022-2318,CVE-2022-26365 - Linux kernel vulnerabilities - CVE-2022-1882,CVE-2022-26373,CVE-2022-3176,CVE-2022-36879,CVE-2022-39189,CVE-2022-1882,CVE-2022-26373,CVE-2022-39189,CVE-2022-36879,CVE-2022-3176 - Linux kernel vulnerabilities - CVE-2021-4159,CVE-2022-20369,CVE-2022-2318,CVE-2022-26365,CVE-2022-26373,CVE-2022-3176,CVE-2022-33740,CVE-2022-33741,CVE-2022-33742,CVE-2022-33744,CVE-2022-36879,CVE-2022-26365,CVE-2022-36879,CVE-2022-33741,CVE-2022-2318,CVE-2022-3176,CVE-2021-4159,CVE-2022-33744,CVE-2022-20369,CVE-2022-33740,CVE-2022-26373,CVE-2022-33742 - Linux kernel vulnerabilities - CVE-2022-2602,CVE-2022-41674,CVE-2022-42719,CVE-2022-42720,CVE-2022-42721,CVE-2022-42722,CVE-2022-42722,CVE-2022-41674,CVE-2022-42721,CVE-2022-2602,CVE-2022-42719,CVE-2022-42720 - Linux kernel vulnerabilities - CVE-2022-2602,CVE-2022-41674,CVE-2022-42720,CVE-2022-42721,CVE-2022-2602,CVE-2022-41674,CVE-2022-42721,CVE-2022-42720 - Linux kernel vulnerabilities - CVE-2022-20422,CVE-2022-2905,CVE-2022-2978,CVE-2022-3028,CVE-2022-3625,CVE-2022-3635,CVE-2022-39190,CVE-2022-40768,CVE-2022-3028,CVE-2022-40768,CVE-2022-3635,CVE-2022-20422,CVE-2022-2905,CVE-2022-39190,CVE-2022-2978,CVE-2022-3625 - Linux kernel vulnerabilities - CVE-2022-42703,CVE-2022-41222,CVE-2022-20422,CVE-2022-2153,CVE-2022-2978,CVE-2022-29901,CVE-2022-3028,CVE-2022-3625,CVE-2022-3635,CVE-2022-39188,CVE-2022-40768,CVE-2022-42719,CVE-2022-3635,CVE-2022-29901,CVE-2022-39188,CVE-2022-2978,CVE-2022-2153,CVE-2022-42719,CVE-2022-3625,CVE-2022-3028,CVE-2022-20422,CVE-2022-42703,CVE-2022-41222,CVE-2022-40768 - Linux kernel vulnerabilities - CVE-2022-20422,CVE-2022-2905,CVE-2022-2978,CVE-2022-3028,CVE-2022-3625,CVE-2022-3635,CVE-2022-39190,CVE-2022-40768,CVE-2022-3028,CVE-2022-39190,CVE-2022-3625,CVE-2022-20422,CVE-2022-40768,CVE-2022-2905,CVE-2022-2978,CVE-2022-3635 - Linux kernel vulnerabilities - CVE-2022-42703,CVE-2022-41222,CVE-2022-20422,CVE-2022-2153,CVE-2022-2978,CVE-2022-29901,CVE-2022-3028,CVE-2022-3625,CVE-2022-3635,CVE-2022-39188,CVE-2022-40768,CVE-2022-42719,CVE-2022-39188,CVE-2022-42703,CVE-2022-20422,CVE-2022-29901,CVE-2022-3635,CVE-2022-2153,CVE-2022-40768,CVE-2022-42719,CVE-2022-2978,CVE-2022-3625,CVE-2022-3028,CVE-2022-41222 - Sysstat vulnerability - CVE-2022-39377 - Linux kernel vulnerabilities - CVE-2022-42703,CVE-2022-3524,CVE-2022-3564,CVE-2022-3565,CVE-2022-3566,CVE-2022-3567,CVE-2022-3594,CVE-2022-3621,CVE-2022-3564,CVE-2022-3524,CVE-2022-3594,CVE-2022-3566,CVE-2022-3565,CVE-2022-42703,CVE-2022-3567,CVE-2022-3621 - Linux kernel vulnerabilities - CVE-2022-43945,CVE-2022-42703,CVE-2022-3524,CVE-2022-3564,CVE-2022-3565,CVE-2022-3566,CVE-2022-3567,CVE-2022-3594,CVE-2022-3621,CVE-2022-3567,CVE-2022-3564,CVE-2022-43945,CVE-2022-3566,CVE-2022-42703,CVE-2022-3565,CVE-2022-3621,CVE-2022-3524,CVE-2022-3594 - Linux kernel vulnerabilities - CVE-2022-43945,CVE-2022-42703,CVE-2022-3524,CVE-2022-3564,CVE-2022-3565,CVE-2022-3566,CVE-2022-3567,CVE-2022-3594,CVE-2022-3621,CVE-2022-3524,CVE-2022-3564,CVE-2022-3621,CVE-2022-3567,CVE-2022-43945,CVE-2022-3566,CVE-2022-42703,CVE-2022-3565,CVE-2022-3594 - Linux kernel (GKE) vulnerabilities - CVE-2022-42703,CVE-2022-3524,CVE-2022-3564,CVE-2022-3565,CVE-2022-3566,CVE-2022-3567,CVE-2022-3594,CVE-2022-3621,CVE-2022-42703,CVE-2022-3524,CVE-2022-3594,CVE-2022-3566,CVE-2022-3621,CVE-2022-3564,CVE-2022-3565,CVE-2022-3567 - Linux kernel (Azure) vulnerabilities - CVE-2022-42703,CVE-2022-3524,CVE-2022-3564,CVE-2022-3565,CVE-2022-3566,CVE-2022-3567,CVE-2022-3594,CVE-2022-3621,CVE-2022-42703,CVE-2022-3524,CVE-2022-3594,CVE-2022-3566,CVE-2022-3621,CVE-2022-3564,CVE-2022-3565,CVE-2022-3567 - Linux kernel (Azure) vulnerabilities - CVE-2022-43945,CVE-2022-42703,CVE-2022-3524,CVE-2022-3564,CVE-2022-3565,CVE-2022-3566,CVE-2022-3567,CVE-2022-3594,CVE-2022-3621,CVE-2022-42703,CVE-2022-3524,CVE-2022-3594,CVE-2022-3566,CVE-2022-3621,CVE-2022-43945,CVE-2022-3564,CVE-2022-3565,CVE-2022-3567 - Linux kernel (OEM) vulnerabilities - CVE-2022-43945,CVE-2022-42703,CVE-2022-26365,CVE-2022-33743,CVE-2022-3524,CVE-2022-3564,CVE-2022-3566,CVE-2022-3567,CVE-2022-3594,CVE-2022-3621,CVE-2022-3524,CVE-2022-26365,CVE-2022-3564,CVE-2022-3621,CVE-2022-3567,CVE-2022-43945,CVE-2022-3566,CVE-2022-33743,CVE-2022-42703,CVE-2022-3594 - Linux kernel vulnerabilities - CVE-2022-0171,CVE-2022-20421,CVE-2022-2663,CVE-2022-3061,CVE-2022-3303,CVE-2022-3586,CVE-2022-3646,CVE-2022-3649,CVE-2022-39188,CVE-2022-39842,CVE-2022-40307,CVE-2022-4095,CVE-2022-43750,CVE-2022-3646,CVE-2022-20421,CVE-2022-39188,CVE-2022-3061,CVE-2022-0171,CVE-2022-40307,CVE-2022-39842,CVE-2022-3586,CVE-2022-43750,CVE-2022-2663,CVE-2022-4095,CVE-2022-3649,CVE-2022-3303 - Linux kernel vulnerabilities - CVE-2022-20421,CVE-2022-2663,CVE-2022-3061,CVE-2022-3303,CVE-2022-3586,CVE-2022-3646,CVE-2022-39842,CVE-2022-40307,CVE-2022-4095,CVE-2022-43750,CVE-2022-40307,CVE-2022-39842,CVE-2022-3646,CVE-2022-3061,CVE-2022-4095,CVE-2022-3303,CVE-2022-20421,CVE-2022-3586,CVE-2022-2663,CVE-2022-43750 - Linux kernel (Azure) vulnerabilities - CVE-2022-20421,CVE-2022-2663,CVE-2022-3061,CVE-2022-3303,CVE-2022-3586,CVE-2022-3646,CVE-2022-39842,CVE-2022-40307,CVE-2022-4095,CVE-2022-43750,CVE-2022-39842,CVE-2022-20421,CVE-2022-43750,CVE-2022-2663,CVE-2022-3646,CVE-2022-40307,CVE-2022-3061,CVE-2022-3303,CVE-2022-4095,CVE-2022-3586 - Linux kernel vulnerabilities - CVE-2022-0171,CVE-2022-20421,CVE-2022-2663,CVE-2022-3061,CVE-2022-3303,CVE-2022-3586,CVE-2022-3646,CVE-2022-3649,CVE-2022-39188,CVE-2022-39842,CVE-2022-40307,CVE-2022-4095,CVE-2022-43750,CVE-2022-39188,CVE-2022-39842,CVE-2022-20421,CVE-2022-43750,CVE-2022-2663,CVE-2022-3649,CVE-2022-3646,CVE-2022-0171,CVE-2022-40307,CVE-2022-3061,CVE-2022-3303,CVE-2022-4095,CVE-2022-3586 - Linux kernel (Azure) vulnerabilities - CVE-2022-20421,CVE-2022-2663,CVE-2022-3061,CVE-2022-3303,CVE-2022-3586,CVE-2022-3646,CVE-2022-39842,CVE-2022-40307,CVE-2022-4095,CVE-2022-43750,CVE-2022-3646,CVE-2022-20421,CVE-2022-3061,CVE-2022-40307,CVE-2022-39842,CVE-2022-3586,CVE-2022-43750,CVE-2022-2663,CVE-2022-4095,CVE-2022-3303 - Linux kernel vulnerabilities - CVE-2022-43945,CVE-2022-42896,CVE-2022-3643,CVE-2022-45934,CVE-2022-42896,CVE-2022-43945,CVE-2022-45934,CVE-2022-3643 - Linux kernel vulnerabilities - CVE-2022-4378,CVE-2022-42896,CVE-2022-3643,CVE-2022-45934,CVE-2022-3643,CVE-2022-42896,CVE-2022-4378,CVE-2022-45934 - Linux kernel (OEM) vulnerabilities - CVE-2022-4378,CVE-2022-42896,CVE-2022-45934,CVE-2022-42896,CVE-2022-45934,CVE-2022-4378 - Linux kernel (BlueField) vulnerabilities - CVE-2022-20421,CVE-2022-2663,CVE-2022-3061,CVE-2022-3303,CVE-2022-3586,CVE-2022-3646,CVE-2022-39842,CVE-2022-40307,CVE-2022-4095,CVE-2022-43750,CVE-2022-3303,CVE-2022-43750,CVE-2022-3646,CVE-2022-4095,CVE-2022-3061,CVE-2022-39842,CVE-2022-20421,CVE-2022-2663,CVE-2022-3586,CVE-2022-40307 - Linux kernel vulnerabilities - CVE-2022-4378,CVE-2022-42896,CVE-2022-3643,CVE-2022-45934,CVE-2022-4378,CVE-2022-45934,CVE-2022-42896,CVE-2022-3643 - Linux kernel vulnerabilities - CVE-2022-43945,CVE-2022-42896,CVE-2022-3643,CVE-2022-45934,CVE-2022-45934,CVE-2022-43945,CVE-2022-3643,CVE-2022-42896 - Linux kernel (Raspberry Pi) vulnerabilities - CVE-2022-43945,CVE-2022-42896,CVE-2022-3643,CVE-2022-45934,CVE-2022-43945,CVE-2022-42896,CVE-2022-3643,CVE-2022-45934 - Linux kernel vulnerabilities - CVE-2022-43945,CVE-2022-42896,CVE-2022-3643,CVE-2022-45934,CVE-2022-43945,CVE-2022-42896,CVE-2022-3643,CVE-2022-45934 SP3 (v3.8) Bug Fixes: - Enabled mt45 two finger scroll and tap actions - Time zone for Turkey was set to UTC+2:00 instead of UTC+3:00 - Fixed the importation of .crt certificates from Automatic Update or a ThinPro configuration file (profile.xml) Security Updates: - Docker vulnerability - CVE-2021-41092 - ICU vulnerability - CVE-2021-30535 - systemd vulnerability - CVE-2021-3997 - util-linux vulnerabilities - CVE-2021-3995,CVE-2021-3996 - Speex vulnerability - CVE-2020-23903 - cryptsetup vulnerability - CVE-2021-4122 - Cyrus SASL vulnerability - CVE-2022-24407 - PolicyKit vulnerability - CVE-2021-4115 - virglrenderer vulnerabilities - CVE-2022-0135,CVE-2022-0175,CVE-2022-0175,CVE-2022-0135 - GNU C Library vulnerabilities - CVE-2016-10228,CVE-2019-25013,CVE-2020-27618,CVE-2020-29562,CVE-2021-3326,CVE-2020-6096,CVE-2021-27645,CVE-2021-35942,CVE-2021-3998,CVE-2021-3999,CVE-2022-23218,CVE-2022-23219,CVE-2021-3999,CVE-2021-35942,CVE-2019-25013,CVE-2022-23219,CVE-2021-3998,CVE-2016-10228,CVE-2020-29562,CVE-2021-3326,CVE-2020-27618,CVE-2021-27645,CVE-2022-23218,CVE-2020-6096 - tar vulnerability - CVE-2021-20193 - FriBidi vulnerabilities - CVE-2022-25308,CVE-2022-25309,CVE-2022-25310,CVE-2022-25310,CVE-2022-25308,CVE-2022-25309 - libarchive vulnerability - CVE-2022-26280 - XZ Utils vulnerability - CVE-2022-1271 - Gzip vulnerability - CVE-2022-1271 - klibc vulnerabilities - CVE-2021-31870,CVE-2021-31871,CVE-2021-31872,CVE-2021-31873,CVE-2021-31870,CVE-2021-31872,CVE-2021-31873,CVE-2021-31871 - Bash vulnerability - CVE-2019-18276 - libinput vulnerability - CVE-2022-1215 - libsepol vulnerabilities - CVE-2021-36084,CVE-2021-36085,CVE-2021-36086,CVE-2021-36087,CVE-2021-36086,CVE-2021-36085,CVE-2021-36084,CVE-2021-36087 - networkd-dispatcher regression - CVE-2022-29799,CVE-2022-29800 - Rsyslog vulnerability - CVE-2022-24903 - Dnsmasq vulnerability - CVE-2022-0934 - containerd regression - CVE-2022-23648 - OpenLDAP vulnerability - CVE-2022-29155 - Apport vulnerabilities - CVE-2021-3899,CVE-2022-1242,CVE-2022-28652,CVE-2022-28654,CVE-2022-28655,CVE-2022-28656,CVE-2022-28657,CVE-2022-28658,CVE-2022-28652,CVE-2022-28658,CVE-2022-28655,CVE-2022-28654,CVE-2021-3899,CVE-2022-28657,CVE-2022-28656,CVE-2022-1242 - dpkg vulnerability - CVE-2022-1664 - E2fsprogs vulnerability - CVE-2022-1304 - BlueZ vulnerabilities - GnuPG vulnerability - CVE-2022-34903 - OpenSSL vulnerability - CVE-2022-2097 - NSS vulnerabilities - CVE-2022-22747,CVE-2022-34480,CVE-2022-22747,CVE-2022-34480 - Python vulnerability - CVE-2015-20107 - HarfBuzz vulnerability - CVE-2022-33068 - PyJWT vulnerability - CVE-2022-29217 - FreeType vulnerabilities - CVE-2022-27405,CVE-2022-27406,CVE-2022-27404,CVE-2022-31782 protobuf-c vulnerability - CVE-2022-33070,CVE-2022-33070 - Net-SNMP vulnerabilities - CVE-2022-24806,CVE-2022-24808,CVE-2022-24809,CVE-2022-24805,CVE-2022-24810,CVE-2022-24807 - libxml2 vulnerability - CVE-2016-3709 - GnuTLS vulnerabilities - CVE-2021-4209,CVE-2022-2509,CVE-2021-4209,CVE-2022-2509 - Libxslt vulnerabilities - CVE-2019-5815,CVE-2021-30560,CVE-2019-5815,CVE-2021-30560 - poppler vulnerability - CVE-2022-38784 - GDK-PixBuf vulnerability - CVE-2021-44648 - Wayland vulnerability - CVE-2021-3782 - Vim regression - CVE-2022-0943,CVE-2022-1154,CVE-2022-1420,CVE-2022-1616,CVE-2022-1619,CVE-2022-1620,CVE-2022-1621,CVE-2022-0943,CVE-2022-1154,CVE-2022-1620,CVE-2022-1420,CVE-2022-1619,CVE-2022-1616,CVE-2022-1621 - Bind vulnerabilities - CVE-2022-2795,CVE-2022-2881,CVE-2022-2906,CVE-2022-3080,CVE-2022-38177,CVE-2022-38178,CVE-2022-3080,CVE-2022-2881,CVE-2022-38177,CVE-2022-2906,CVE-2022-38178,CVE-2022-2795 - PCRE vulnerabilities - CVE-2022-1586,CVE-2022-1587 - libjpeg-turbo vulnerabilities - CVE-2018-11813,CVE-2020-17541,CVE-2020-35538,CVE-2021-46822,CVE-2020-35538,CVE-2021-46822,CVE-2020-17541,CVE-2018-11813 - Ghostscript vulnerabilities - CVE-2020-27792,CVE-2022-2085,CVE-2022-2085,CVE-2020-27792 - DHCP vulnerabilities - CVE-2022-2928,CVE-2022-2929,CVE-2022-2929,CVE-2022-2928 - GMP vulnerability - CVE-2021-43618 - unzip vulnerabilities - CVE-2021-4217,CVE-2022-0529,CVE-2022-0530,CVE-2022-0529,CVE-2021-4217,CVE-2022-0530 - Heimdal vulnerabilities - CVE-2018-16860,CVE-2019-12098,CVE-2021-3671,CVE-2022-3116,CVE-2018-16860,CVE-2022-3116,CVE-2019-12098,CVE-2021-3671 - zlib vulnerability - CVE-2022-37434 - Libksba vulnerability - CVE-2022-3515 - Perl vulnerability - CVE-2020-16156 - curl vulnerabilities - CVE-2022-32221,CVE-2022-35260,CVE-2022-42915,CVE-2022-42916,CVE-2022-32221,CVE-2022-35260,CVE-2022-42916,CVE-2022-42915 - DBus vulnerabilities - CVE-2022-42010,CVE-2022-42011,CVE-2022-42012,CVE-2022-42010,CVE-2022-42012,CVE-2022-42011 - SQLite vulnerability - CVE-2022-35737 - pixman vulnerability - CVE-2022-44638 - LibTIFF vulnerabilities - CVE-2022-2519,CVE-2022-2520,CVE-2022-2521,CVE-2022-2953,CVE-2022-2867,CVE-2022-2868,CVE-2022-2869,CVE-2022-34526,CVE-2022-3570,CVE-2022-3598,CVE-2022-3599,CVE-2022-3597,CVE-2022-3626,CVE-2022-3627,CVE-2022-2869,CVE-2022-3627,CVE-2022-2519,CVE-2022-34526,CVE-2022-2867,CVE-2022-2520,CVE-2022-2521,CVE-2022-3570,CVE-2022-3626,CVE-2022-3597,CVE-2022-2868,CVE-2022-2953,CVE-2022-3599,CVE-2022-3598 - WebKitGTK vulnerabilities - CVE-2022-42823,CVE-2022-32923,CVE-2022-32888,CVE-2022-42824,CVE-2022-42799 - Expat vulnerabilities - CVE-2022-43680,CVE-2022-43680,CVE-2022-40674 - snapd vulnerabilities - CVE-2021-3155,CVE-2021-4120,CVE-2021-44730,CVE-2021-44731,CVE-2021-3155,CVE-2021-4120,CVE-2021-44730,CVE-2021-44731 - snapd vulnerabilities - CVE-2021-3155,CVE-2021-4120,CVE-2021-44730,CVE-2021-44731,CVE-2021-44730,CVE-2021-44731,CVE-2021-4120,CVE-2021-3155 - snapd regression - CVE-2021-3155,CVE-2021-4120,CVE-2021-44730,CVE-2021-44731 Modifications: - HP ThinPro 8.0 SP3 and later versions support HP USB-C Dock G5 (1,2) with mt440, mt645, and t655 - HP ThinPro 8.0 SP3 and later versions support HP Thunderbolt G4 Dock (1,2) with mt645 - HP ThinPro 8.0 SP3 and later versions partially support HP E24mG4, E24uG4, E27mG4, and E27uG4 FHD USB-C Conferencing Monitors (1,3) with mt440, mt645, t550, and t655 - Enhanced Imprivata ProveID Embedded agent registry settings 1. New registry setting: root/Imprivata/SysInfo/exit-target to execute by default the actions defined under /usr/lib/imprivata-helper/exit-actions.d/ upon an exit of the ProveID Embedded agent. 2. Gave to the registry keys under root/Imprivata/Imprivata.conf/ the ability to override /usr/lib/imprivata/runtime/etc/Imprivata.conf. - Enhanced regeditor 1. Regeditor now displays the directory key descriptions. 2. Revisited the regeditor's right click menu and its actions. - Translations for ThinPro 8.0 SP2 - Disclaimers 1. Docks, Displays, and peripherals sold separately. 2. Dock firmware can be updated for users of HP ThinPro 8.0 SP3 and later versions. 3. Monitor firmware updates are possible only by using a connected device using Microsoft Windows OS. SP2 (v2.5) Bug Fixes: - The system required reboot before a second domain user can connect with a connection previously used by a different domain user. - Enhanced a startup service which was causing high CPU usage for 2-3 minutes after boot - Imprivata Citrix connections with USB in USB Redirection mode, will be changed to Mapping mode - Imprivata Citrix desktop will remain active for up to 10 seconds after exit the connection - Removed "Minimize Local Keyboard Shortcuts" button from Control Panel Keyboard configuration page Security Updates: - None Modifications: - Added Thin Client models: HP Pro t550 Thin Client and HP Elite t655 Thin Client - Updated HPLIP to version 3.22.6 - Removed HP Cloud Endpoint Manager Configuration Screen from OOBE wizard - Translations for ThinPro 8.0 SP1 SP1 (v1.7) Bug Fixes: - With 2 external monitors, laptop lid action set to "Do Nothing" and mirror mode, changing to Extended Mode with lid closed activates the mtc monitor - Enabled touchpad to wake mt645 from sleep - Added text message to encourage rebooting the system after hptc-bios-flash and hptc-bios-capsule-update processing is complete - Configuring Mobile Thin Client lid action to "nothing" in AC and "Sleep" in DC, then close lid with AC connected, remove AC Power, open lid does not enable mtc monitor - Some Mobile Thin Client systems input volume mute will change to mute after reboot - After enable/disable Airplane mode with F11 on mt645 with Qualcomm Martini Fast Connect 6900 Wi-Fi does not automatically enable Bluetooth Devices and Wi-Fi connection Security Updates: - None Modifications: - Added support for sustaining systems - Updated codecs to support H.264 encoder. Other codecs include Windows Media Bundle, MPEG2, MPEG4, MP3, AAC, AC3, HE AAC, Libgstfluvadec, GStreamer 1.x, H.264 Decoder, H.265 Decoder, FFMPEG Enabler. 9. Contact Information ============================================================================ For contact and support information, refer to: http://www.hp.com/go/thinclient