~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Service Pack 4 for ThinPro 8.1 4.3 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 1. Service Pack 4 for ThinPro 8.1 ============================================================================ HP announces the service pack 'Service Pack 4 for ThinPro 8.1'. 2. Support Matrix ============================================================================ Package Platform Image ---------------------------------------------------------------------------- ThinPro8.1_SP-4.3-signed.xar PC 8.1 ThinPro8.1_SP-4.3-signed.xar mt21 8.1 ThinPro8.1_SP-4.3-signed.xar mt22 8.1 ThinPro8.1_SP-4.3-signed.xar mt32 8.1 ThinPro8.1_SP-4.3-signed.xar mt440 8.1 ThinPro8.1_SP-4.3-signed.xar mt45 8.1 ThinPro8.1_SP-4.3-signed.xar mt46 8.1 ThinPro8.1_SP-4.3-signed.xar mt645 8.1 ThinPro8.1_SP-4.3-signed.xar mt645g8 8.1 ThinPro8.1_SP-4.3-signed.xar t430 8.1 ThinPro8.1_SP-4.3-signed.xar t530 8.1 ThinPro8.1_SP-4.3-signed.xar t540 8.1 ThinPro8.1_SP-4.3-signed.xar t550 8.1 ThinPro8.1_SP-4.3-signed.xar t630 8.1 ThinPro8.1_SP-4.3-signed.xar t640 8.1 ThinPro8.1_SP-4.3-signed.xar t655 8.1 ThinPro8.1_SP-4.3-signed.xar t730 8.1 ThinPro8.1_SP-4.3-signed.xar t740 8.1 ThinPro8.1_SP-4.3-signed.xar t755 8.1 3. What's New ============================================================================ SP4 (v4.3) - Fixed multiple WWAN connection and security issues - Fixed issues where multiple monitors did not display correctly - Fixed issue with touch screen rotation - Fixed multiple errors logged when plugging in USB4 dock - Fixed HP Virtual Keyboard unable to open in login UI if it was open while the thin client went to sleep - Fixed mobile thin client issue where mute LED was always lit - Fixed mobile thin client wakes up from sleep occasionally when connected to USB-C dock - Fixed saving and loading configurations with ThinState on USB storage with two partitions - Fixed WiFi icon displayed in system tray on thin clients that are not configured with WiFi - Fixed hostname will not change when assigned DHCP server - Bind :: CVE-2024-1975, CVE-2024-0760, CVE-2024-4076, CVE-2024-1737 - BlueZ :: CVE-2023-27349, CVE-2022-3563 - BusyBox :: CVE-2022-48174, CVE-2023-42364, CVE-2023-42363, CVE-2023-42365 - curl :: CVE-2024-7264 - FFmpeg :: CVE-2024-31582, CVE-2024-31578, CVE-2023-51796, CVE-2023-50010, CVE-2023-49528, CVE-2024-31585, CVE-2023-51793, CVE-2023-50009, CVE-2023-51798, CVE -2023-50008, CVE-2023-49501, CVE-2023-51795, CVE-2023-51794, CVE-2023-49502, CVE-2023-50007 - GDK-PixBuf :: CVE-2022-48622 - Ghostscript :: CVE-2024-29509, CVE-2024-29506, CVE-2024-29508, CVE-2023-52722, CVE-2024-33869, CVE-2024-29510, CVE-2024-29511, CVE-2024-33870, CVE-2024-29507 , CVE-2024-33871 - GIFLIB :: CVE-2021-40633, CVE-2022-28506, CVE-2023-39742 - GNU C Library :: CVE-2024-33601, CVE-2024-33600, CVE-2024-33599, CVE-2024-33602 - GStreamer Base Plugins :: CVE-2024-4453 - GTK :: CVE-2024-6655 - Kerberos :: CVE-2024-37371, CVE-2024-37370 - libarchive :: CVE-2024-26256 - libndp :: CVE-2024-5564 - LibTIFF :: CVE-2023-3164 - libvpx :: CVE-2024-5197 - Linux kernel :: CVE-2024-26593, CVE-2024-0841, CVE-2024-26934, CVE-2024-27018, CVE-2024-26898, CVE-2024-26929, CVE-2024-23307, CVE-2023-6270, CVE-2024-27020, CVE-2024-27015, CVE-2022-38096, CVE-2024-27013, CVE-2024-35982, CVE-2024-25739, CVE-2024-26603, CVE-2024-36008, CVE-2024-35997, CVE-2024-35978, CVE-2024-26600, CVE-2024-26602, CVE-2024-27016, CVE-2024-26606, CVE-2024-35990, CVE-2024-26601, CVE-2024-1151, CVE-2024-35984, CVE-2024-26910, CVE-2023-52645, CVE-2024-24861, CVE-2024-27019, CVE-2024-24859, CVE-2024-24858, CVE-2024-24857, CVE-2024-26817, CVE-2024-26813, CVE-2024-26999, CVE-2023-52880, CVE-2024-35807, CVE-2024-35907, CVE-2024-35940, CVE-2024-35854, CVE-2024-35969, CVE-2024-26629, CVE-2024-27395, CVE-2024-35817, CVE-2024-35935, CVE-2024-36029, CVE-2024-26748, CVE-2024-35872, CVE-2024-35944, CVE-2024-27001, CVE-2024-27396, CVE-2024-26890, CVE-2024-35855, CVE-2024-35922, CVE-2024-26825, CVE-2024-35821, CVE-2024-26973, CVE-2024-26687, CVE-2024-35871, CVE-2024-26719, CVE-2024-35825, CVE-2024-26685, CVE-2024-26676, CVE-2024-26790, CVE-2024-26923, CVE-2024-26917, CVE-2024-35905, CVE-2024-26920, CVE-2024-35805, CVE-2024-26663, CVE-2024-26976, CVE-2024-26708, CVE-2024-35847, CVE-2024-26681, CVE-2024-26661, CVE-2024-26828, CVE-2024-26993, CVE-2024-35915, CVE-2024-26994, CVE-2024-26694, CVE-2024-35912, CVE-2024-26674, CVE-2024-27393, CVE-2024-26812, CVE-2024-26664, CVE-2024-35877, CVE-2024-35910, CVE-2024-26803, CVE-2024-35886, CVE-2024-26722, CVE-2024-26698, CVE-2024-26723, CVE-2024-36020, CVE-2024-26984, CVE-2024-26981, CVE-2023-52638, CVE-2024-26659, CVE-2024-26798, CVE-2024-26814, CVE-2024-26829, CVE-2024-35890, CVE-2024-26831, CVE-2024-35973, CVE-2024-26935, CVE-2024-35925, CVE-2024-35813, CVE-2024-26965, CVE-2024-26684, CVE-2024-26958, CVE-2024-26665, CVE-2024-26733, CVE-2024-26955, CVE-2024-27004, CVE-2024-35791, CVE-2024-26716, CVE-2024-35934, CVE-2024-35888, CVE-2024-26916, CVE-2024-35930, CVE-2024-35822, CVE-2024-26680, CVE-2024-35976, CVE-2024-26691, CVE-2024-26667, CVE-2024-26818, CVE-2024-26820, CVE-2024-35823, CVE-2024-27437, CVE-2024-26688, CVE-2024-35884, CVE-2024-35970, CVE-2024-26792, CVE-2024-26826, CVE-2024-26782, CVE-2024-26707, CVE-2024-35833, CVE-2024-35896, CVE-2024-26977, CVE-2024-35851, CVE-2024-26919, CVE-2024-26926, CVE-2024-26838, CVE-2024-35796, CVE-2024-35960, CVE-2024-26970, CVE-2024-26989, CVE-2024-26988, CVE-2024-26642, CVE-2024-26810, CVE-2024-26830, CVE-2024-35989, CVE-2024-26822, CVE-2024-35785, CVE-2024-26960, CVE-2024-35809, CVE-2024-26677, CVE-2024-35938, CVE-2024-27059, CVE-2024-26957, CVE-2024-26697, CVE-2024-36005, CVE-2024-35789, CVE-2024-27416, CVE-2024-26956, CVE-2024-35902, CVE-2024-36004, CVE-2024-36025, CVE-2024-35849, CVE-2024-26715, CVE-2024-26654, CVE-2024-26718, CVE-2024-35897, CVE-2024-27008, CVE-2023-52488, CVE-2024-35900, CVE-2024-35958, CVE-2024-26689, CVE-2023-52642, CVE-2024-26660, CVE-2024-26802, CVE-2024-35988, CVE-2024-36006, CVE-2024-26969, CVE-2024-26693, CVE-2024-26922, CVE-2023-52643, CVE-2024-26679, CVE-2024-26696, CVE-2024-26950, CVE-2024-35853, CVE-2024-26712, CVE-2024-35879, CVE-2024-27009, CVE-2024-26734, CVE-2024-26666, CVE-2023-52631, CVE-2024-26714, CVE-2024-26811, CVE-2024-26711, CVE-2024-26966, CVE-2024-26996, CVE-2024-27000, CVE-2024-26726, CVE-2024-35806, CVE-2024-35885, CVE-2024-26736, CVE-2024-26964, CVE-2024-26720, CVE-2024-26735, CVE-2024-26703, CVE-2024-26662, CVE-2024-36007, CVE-2024-26675, CVE-2024-35898, CVE-2024-35936, CVE-2024-35955, CVE-2024-26789, CVE-2024-26931, CVE-2023-52637, CVE-2024-35857, CVE-2024-26961, CVE-2024-35933, CVE-2024-35893, CVE-2024-26695, CVE-2024-26925, CVE-2024-35804, CVE-2024-35819, CVE-2024-26710, CVE-2024-35899, CVE-2024-26889, CVE-2024-26951, CVE-2024-26700, CVE-2024-35815, CVE-2024-35895, CVE-2024-26824, CVE-2023-52699, CVE-2024-26937, CVE-2024-26717, CVE-2024-26702, CVE-2024-26974, CVE-2024-35950, CVE-2024-35852 - OpenSSH :: CVE-2024-6387 - OpenSSL :: CVE-2022-40735, CVE-2024-4741, CVE-2024-5535, CVE-2024-2511, CVE-2024-4603 - ORC :: CVE-2024-40897 - poppler :: CVE-2024-6239 - Python :: CVE-2019-9948, CVE-2020-27619, CVE-2021-29921, CVE-2019-9636, CVE-2021-3177, CVE-2022-48565, CVE-2019-10160, CVE-2018-1060, CVE-2021-3737, CVE-2022 -45061, CVE-2022-48560, CVE-2019-20907, CVE-2018-1061, CVE-2018-14647, CVE-2019-9674, CVE-2019-5010, CVE-2018-20406, CVE-2023-24329, CVE-2023-41105, CVE-2019-17 514, CVE-2022-0391, CVE-2019-16056, CVE-2020-26116, CVE-2015-20107, CVE-2022-42919, CVE-2023-6597, CVE-2022-48564, CVE-2020-8492, CVE-2019-9947, CVE-2019-16935, CVE-2019-9740, CVE-2019-18348, CVE-2018-20852, CVE-2021-4189, CVE-2023-40217, CVE-2021-3733, CVE-2023-6507, CVE-2020-14422, CVE-2022-48566, CVE-2024-0450, CVE- 2021-3426, CVE-2024-0397, CVE-2024-4032 - python-zipp :: CVE-2024-5569 - TPM2 Software Stack :: CVE-2024-29040, CVE-2023-22745 - WebKitGTK :: CVE-2024-27834 - Wget :: CVE-2024-38428 - wpa_supplicant and hostapd :: CVE-2024-5290 4. Documentation Set ============================================================================ There is no additional documentation associated with this softpaq. 5. Installation ============================================================================ 5.1 Installing update for ThinPro To install this addon: 1. Use the installer to deploy files to the server. 2. Copy the add-on from the appropriate directory to the "/tmp" directory. 3. On the device, run the command as follows: "xarinstall /tmp/ThinPro8.1_SP-4.3-signed.xar" 4. Reboot the affected devices. Tip: This section describes the manual process of installing packages. To perform the recommended update method, use "Easy Update" in the ThinPro Control Panel. For detailed information see the "HP ThinPro Administrator's Guide". 6. Known Issues ============================================================================ There are no known issues. 7. Additional Notes ============================================================================ There are no additional notes. 8. Release History ============================================================================ 2024-09-05 Package version 4.3 - First official installer release 9. Contact Information ============================================================================ For contact and support information, refer to: http://www.hp.com/go/thinclient