~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Service Pack 13 for ThinPro 7.2 - December 6, 2022 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 1. Service Pack 13 for ThinPro 7.2 ============================================================================ HP announces Service Pack 13 for ThinPro 7.2. This Service Pack contains bug fixes and security updates for ThinPro 7.2. 2. Support Matrix ============================================================================ Package Platform Image ---------------------------------------------------------------------- ThinPro7.2_SP-13.5.xar t240 7.2 ThinPro7.2_SP-13.5.xar t420 7.2 ThinPro7.2_SP-13.5.xar t430 7.2 ThinPro7.2_SP-13.5.xar t530 7.2 ThinPro7.2_SP-13.5.xar t540 7.2 ThinPro7.2_SP-13.5.xar t628 7.2 ThinPro7.2_SP-13.5.xar t630 7.2 ThinPro7.2_SP-13.5.xar t638 7.2 ThinPro7.2_SP-13.5.xar t640 7.2 ThinPro7.2_SP-13.5.xar t730 7.2 ThinPro7.2_SP-13.5.xar t740 7.2 ThinPro7.2_SP-13.5.xar mt21 7.2 ThinPro7.2_SP-13.5.xar mt22 7.2 ThinPro7.2_SP-13.5.xar mt32 7.2 ThinPro7.2_SP-13.5.xar mt45 7.2 ThinPro7.2_SP-13.5.xar mt46 7.2 ThinPro7.2_SP-13.5.xar HP ThinPro PC Converter 7.2 3. Installation ============================================================================ HP Recommends using HP Device Manager to install the addon. More details can be found in the HP Device Manager documentation. 4. Known Issues ============================================================================ There are no known issues. 5. Contact Information ============================================================================ For contact and support information, refer to: http://www.hp.com/go/thinclient 6. Details ============================================================================ SP13 (v13.5) ------ Bug Fixes: - Enhanced a startup service which was causing high CPU usage for 2-3 minutes after boot - mt32 and mt46 Moble Thin Clients with BIOS 1.0.9 or newer, Type-C port will lose function after S3 and resume then disconnect external monitor and connnect monitor to Type-C port. - Timezone for Turkey was set to UTC+2:00 instead of UTC+3:00 - Fixed the importation of .crt certificates from Automatic Update or a ThinPro configuration file (profile.xml). - Imprivata Citrix desktop remains active for up to 10 seconds after exit the connection - Imprivata Citrix connections with USB in USB Redirection mode, will be changed to Mapping mode instead of USB Redirection mode. - Removed "Minimize Local Keyboard Shortcuts" button from Control Panel Keyboard configuration page. Modifications: - Updated Linux Kernel to version 5.17 - Updated HPLIP to version 3.22.6 - Removed HP Cloud Endpoint Manager Configuration Screen from OOBE wizard SP12 (v12.5) ------ Bug Fixes: - Expanded the number of WiFi SSIDs listed in the Initial Setup Wizard WiFi selection list - Fixed a race condition with start of X server after a Factory Reset causing some certificates to not be available Security Updates: - Intel FW Update - CVE-2021-33656,CVE-2021-33061,CVE-2022-2869,CVE-2022-2868,CVE-2022-2867,CVE-2021-33656,CVE-2021-33061,CVE-2022-2959,CVE-2021-33061,CVE-2022-1943,CVE-2021-3448,CVE-2021-33656,CVE-2021-33061,CVE-2022-2959,CVE-2021-33061,CVE-2022-1943,CVE-2021-33656,CVE-2021-33656,CVE-2021-33656 - Ghostscript vulnerabilities - CVE-2021-45944,CVE-2021-45949 - BlueZ vulnerability - CVE-2022-0204,CVE-2022-0204 - Cyrus SASL vulnerability - CVE-2022-24407 - GNU C Library vulnerabilities - CVE-2016-10228,CVE-2019-25013,CVE-2020-27618,CVE-2020-29562,CVE-2021-3326,CVE-2020-6096,CVE-2021-27645,CVE-2021-35942,CVE-2021-3998,CVE-2021-3999,CVE-2022-23218,CVE-2022-23219,CVE-2021-3999,CVE-2021-35942,CVE-2019-25013,CVE-2022-23219,CVE-2021-3998,CVE-2016-10228,CVE-2020-29562,CVE-2021-3326,CVE-2020-27618,CVE-2021-27645,CVE-2022-23218,CVE-2020-6096 - Expat vulnerabilities and regression - CVE-2022-25236,CVE-2022-25313,CVE-2022-25314,CVE-2022-25315,CVE-2022-25236,CVE-2022-25314,CVE-2022-25315,CVE-2022-25313 - Bind vulnerabilities - CVE-2021-25220,CVE-2022-0396,CVE-2021-25220,CVE-2022-0396 - FriBidi vulnerabilities - CVE-2022-25308,CVE-2022-25309,CVE-2022-25310,CVE-2022-25310,CVE-2022-25308,CVE-2022-25309 - Bash vulnerability - CVE-2019-18276 - DBus vulnerability - CVE-2020-35512 - Cron regression - CVE-2017-9525,CVE-2019-9704,CVE-2019-9705,CVE-2019-9706,CVE-2017-9525 - curl vulnerabilities - CVE-2022-27780,CVE-2022-27781,CVE-2022-27782,CVE-2022-27780,CVE-2022-27782,CVE-2022-27781 - Apport vulnerabilities - CVE-2021-3899,CVE-2022-1242,CVE-2022-28652,CVE-2022-28654,CVE-2022-28655,CVE-2022-28656,CVE-2022-28657,CVE-2022-28658,CVE-2022-28652,CVE-2022-28658,CVE-2022-28655,CVE-2022-28654,CVE-2021-3899,CVE-2022-28657,CVE-2022-28656,CVE-2022-1242 Modifications: - Updated codecs to support H.264 encoder. Other codecs include Windows Media Bundle, MPEG2, MPEG4, MP3, AAC, AC3, HE AAC, Libgstfluvadec, GStreamer 1.x, H.264 Decoder, H.265 Decoder, FFMPEG Enabler. - Translations for ThinPro 7.2 SP11 SP11 (v11.5) ------ Bug Fixes: - HP Smart Client Services is not compatible HP Cloud Endpoint Manager because the device configuration specified by Smart Client Services will override the device-unique configuration of the HP Cloud Endpoint Manager agent. This process clears the enrolled state of the HPCEM agent to the management server. - Fixed a race condition triggered by two or more processes simultaneously updating DHCP Client's configuration file. When this occurs, the DHCP client's configuration file could be corrupted causing the network connection to fail. Security Updates: - None Modifications: - HP USB-C to RJ45 Adapter G2 drivers are added and available in ThinPro 7.2 SP11 SP10 (v10.3) ------ Bug Fixes: - With UI language set to French and configuring a connection, the "User" field was displayed twice, and "Server URL, name, or address" field was missing. Security Updates: - None Modifications: - HP Cloud Endpoint Manager (HPCEM) Agent is added and available on ThinPro 7.2 SP10 SP9 (v9.3) ------ Special note for Service Pack 9: If you installed Service Pack 8, you must do the following: 1. Upgrade to Service Pack 9. <<-- You must do this step before the following steps! 2. Confirm the installation completed successfully. (Check System Information --> Software Information tab reports thinpro7.2-sp 9.3) 3. Execute this command to remove the HPCEM agent (do this either using X Terminal on the device or via HP Device Manager): 1. dpkg -P --force-depends thinpro-hpcem hptc-hpcem-agent 2. dpkg -l hptc-hpcem-agent 4. Confirm that the output from the last command is: "dpkg-query: no packages found matching hptc-hpcem-agent" 5. Execute these commands: 1. fslock 2. fslock_status 6. Verify output from the last command reports "locked"; reboot the Thin Client. Bug Fixes: - None Security Updates: - PolicyKit vulnerability - CVE-2021-4034 Modifications: - None SP8.2 ------ Bug Fixes: - When configuring a non-HP tablet display, the Control Panel Display Settings changes may not be saved after reboot - FreeRDP 1.1 "Remember Me" the user name is not being retained after Log Off FreeRDP connection - Some mobile devices incorrectly display the red battery icon with exclamation mark when ThinPro 7.2 is installed via PC Converter - Rebooting a Thin Client with VNC shadow connection, extended reboot time by ~2 minutes while displaying a console message Security Updates: - GLib vulnerability - CVE-2021-3800 - Python vulnerabilities - CVE-2021-3733,CVE-2021-3737,CVE-2021-3737,CVE-2021-3733 - wpa_supplicant and hostapd vulnerability - CVE-2021-27803 - X.Org X Server vulnerability - CVE-2021-3472 - Samba vulnerability - CVE-2021-20254 - runC vulnerability - CVE-2021-30465 - Linux kernel vulnerabilities - CVE-2021-33624,CVE-2021-3679,CVE-2021-37576,CVE-2021-38160,CVE-2021-38199,CVE-2021-38204,CVE-2021-38160,CVE-2021-3679,CVE-2021-38199,CVE-2021-33624,CVE-2021-38204,CVE-2021-37576 - Linux kernel vulnerabilities - CVE-2021-22543,CVE-2021-3679,CVE-2021-3732,CVE-2021-37576,CVE-2021-38204,CVE-2021-38205,CVE-2021-3732,CVE-2021-3679,CVE-2021-37576,CVE-2021-38204,CVE-2021-22543,CVE-2021-38205 - containerd vulnerability - CVE-2021-41103 - Linux kernel vulnerabilities - CVE-2020-3702,CVE-2021-3732,CVE-2021-38198,CVE-2021-38205,CVE-2021-40490,CVE-2021-42008,CVE-2021-38198,CVE-2020-3702,CVE-2021-3732,CVE-2021-42008,CVE-2021-40490,CVE-2021-38205 - Linux kernel vulnerabilities - CVE-2020-3702,CVE-2021-38198,CVE-2021-40490,CVE-2021-42008,CVE-2020-3702,CVE-2021-40490,CVE-2021-38198,CVE-2021-42008 - Apport vulnerability - GNU binutils vulnerabilities - CVE-2020-16592,CVE-2021-3487,CVE-2021-3487,CVE-2020-16592 - Ceph vulnerabilities - CVE-2020-27781,CVE-2021-20288,CVE-2021-3509,CVE-2021-3524,CVE-2021-3531,CVE-2021-3531,CVE-2021-3524,CVE-2021-3509,CVE-2021-20288,CVE-2020-27781 - Bind vulnerability - CVE-2021-25219 - Docker vulnerability - CVE-2021-41092 - Linux kernel vulnerabilities - CVE-2019-19449,CVE-2020-36385,CVE-2021-3428,CVE-2021-34556,CVE-2021-35477,CVE-2021-3739,CVE-2021-3743,CVE-2021-3753,CVE-2021-3759,CVE-2021-42252,CVE-2020-36385,CVE-2021-42252,CVE-2021-3739,CVE-2021-3428,CVE-2019-19449,CVE-2021-34556,CVE-2021-3753,CVE-2021-3743,CVE-2021-35477,CVE-2021-3759 - Linux kernel vulnerabilities - CVE-2019-19449,CVE-2020-36322,CVE-2020-36385,CVE-2021-3655,CVE-2021-3743,CVE-2021-3753,CVE-2021-3759,CVE-2021-38199,CVE-2021-42252,CVE-2021-38199,CVE-2020-36322,CVE-2021-3759,CVE-2021-3753,CVE-2020-36385,CVE-2019-19449,CVE-2021-3743,CVE-2021-42252,CVE-2021-3655 - Linux kernel vulnerabilities - CVE-2019-19449,CVE-2020-36385,CVE-2021-3428,CVE-2021-34556,CVE-2021-35477,CVE-2021-3739,CVE-2021-3743,CVE-2021-3753,CVE-2021-3759,CVE-2021-3759,CVE-2021-3428,CVE-2021-3743,CVE-2021-34556,CVE-2021-3739,CVE-2021-3753,CVE-2021-35477,CVE-2020-36385,CVE-2019-19449 - Vim vulnerabilities - CVE-2017-17087,CVE-2019-20807,CVE-2021-3872,CVE-2021-3903,CVE-2021-3927,CVE-2021-3928,CVE-2021-3928,CVE-2021-3927,CVE-2017-17087,CVE-2019-20807,CVE-2021-3903,CVE-2021-3872 - NSS vulnerability - CVE-2021-43527 - BusyBox vulnerabilities - CVE-2021-28831,CVE-2021-42374,CVE-2021-42378,CVE-2021-42379,CVE-2021-42380,CVE-2021-42381,CVE-2021-42382,CVE-2021-42384,CVE-2021-42385,CVE-2021-42386,CVE-2021-28831,CVE-2021-42378,CVE-2021-42386,CVE-2021-42385,CVE-2021-42382,CVE-2021-42384,CVE-2021-42379,CVE-2021-42374,CVE-2021-42380,CVE-2021-42381 Modifications: None SP7.4 ------ Bug Fixes: - When SSH is enabled, installing Add-Ons includig Service Packs could stop with message "What do you want to do about modified configuration file SSH_config?" SP6.4 ------ Bug Fixes: - Fixed an issue where an imaged system might experience incorrect data from DNS look up events - Fixed an issue causing Bluetooth and wireless notifications may not be presented when scaling is greater than 100% - Fixed a Control Panel UI issue with enabling LAN DASH - Fixed several UI related issues when resolution is 1920x1080 on German/Spanish/French/Russian language - Fixed an issue which allowed invalid Firewall port/destination rules to be saved - Fixed an issue which Screen Saver Stretched Slideshow is not displayed as stretched images - Fixed an issue in Spanish and Russian UI where the Control Panel "Manageability" and "Input Devices" icons overlap Security Updates: - Bind vulnerability - CVE-2020-8625 - Nettle vulnerability - CVE-2021-20305 - Bind vulnerabilities - CVE-2021-25214,CVE-2021-25215,CVE-2021-25216,CVE-2021-25215,CVE-2021-25214,CVE-2021-25216 - Avahi vulnerabilities - CVE-2021-3468,CVE-2021-3502,CVE-2021-3468,CVE-2021-3502 - Aspell vulnerability - CVE-2019-25051 - QPDF vulnerabilities - CVE-2018-18020,CVE-2021-36978,CVE-2018-18020,CVE-2021-36978 - Python vulnerabilities - CVE-2020-27619,CVE-2021-3177,CVE-2021-3177,CVE-2020-27619 - Apport vulnerabilities - CVE-2021-32549,CVE-2021-32554,CVE-2021-32547,CVE-2021-32553,CVE-2021-32556,CVE-2021-32552,CVE-2021-32557,CVE-2021-32550,CVE-2021-32548,CVE-2021-32555,CVE-2021-32551 - libsndfile vulnerability - CVE-2021-3246 - OpenSSH regression - CVE-2018-15473,CVE-2016-10708,CVE-2018-15473 - OpenSSL vulnerability - CVE-2021-3712,CVE-2021-3712 - NTFS-3G vulnerabilities - GNU cpio vulnerability - CVE-2021-38185 - Qt vulnerabilities - CVE-2020-17507,CVE-2021-38593,CVE-2021-38593,CVE-2020-17507 - Libgcrypt vulnerabilities - CVE-2021-33560,CVE-2021-40528 - curl vulnerabilities - CVE-2021-22945,CVE-2021-22946,CVE-2021-22947,CVE-2021-22947,CVE-2021-22945,CVE-2021-22946 - curl vulnerabilities - CVE-2021-22945,CVE-2021-22946,CVE-2021-22947 - ca-certificates update - Linux kernel vulnerabilities - CVE-2020-25669,CVE-2020-27815,CVE-2020-27830,CVE-2020-28941,CVE-2020-29374,CVE-2020-29568,CVE-2020-29569,CVE-2020-29660,CVE-2020-29661,CVE-2020-27815,CVE-2020-29660,CVE-2020-27830,CVE-2020-29568,CVE-2020-29374,CVE-2020-29569,CVE-2020-29661,CVE-2020-25669,CVE-2020-28941 - Linux kernel vulnerabilities - CVE-2020-25669,CVE-2020-27815,CVE-2020-27830,CVE-2020-28941,CVE-2020-28588,CVE-2020-29568,CVE-2020-29569,CVE-2020-29660,CVE-2020-29661,CVE-2021-20177,CVE-2020-25669,CVE-2020-28588,CVE-2020-27815,CVE-2020-29568,CVE-2020-29660,CVE-2020-29569,CVE-2020-29661,CVE-2021-20177,CVE-2020-28941,CVE-2020-27830 - Linux kernel vulnerabilities - CVE-2020-36158,CVE-2021-20239,CVE-2021-3347,CVE-2021-3178,CVE-2021-3347,CVE-2021-3178,CVE-2020-36158,CVE-2021-20239 - Linux kernel vulnerabilities - CVE-2020-36158,CVE-2021-3178,CVE-2021-3178,CVE-2020-36158 - Linux kernel vulnerabilities - CVE-2021-3444,CVE-2021-27365,CVE-2020-27171,CVE-2020-27170,CVE-2021-27363,CVE-2021-27364,CVE-2020-27170,CVE-2021-27364,CVE-2020-27171,CVE-2021-27363,CVE-2021-3444,CVE-2021-27365 - Linux kernel vulnerabilities - CVE-2020-27171,CVE-2020-27170,CVE-2020-27171,CVE-2020-27170 - Linux kernel vulnerabilities - CVE-2021-20194,CVE-2021-26930,CVE-2021-26931,CVE-2021-3348,CVE-2021-26930,CVE-2021-20194,CVE-2021-3348,CVE-2021-26931 - Linux kernel vulnerabilities - CVE-2018-13095,CVE-2021-3347,CVE-2021-3348,CVE-2021-3347,CVE-2021-3348,CVE-2018-13095 - Linux kernel vulnerabilities - CVE-2021-3493,CVE-2021-3492,CVE-2021-29154,CVE-2021-3492,CVE-2021-3493,CVE-2021-29154 - Linux kernel vulnerabilities - CVE-2021-3493,CVE-2021-29154,CVE-2021-3493,CVE-2021-29154 - Linux kernel regression - CVE-2021-3493,CVE-2021-3493,CVE-2021-29154 - Linux kernel vulnerabilities - CVE-2021-20292,CVE-2021-26930,CVE-2021-26931,CVE-2021-28038,CVE-2021-28688,CVE-2021-29264,CVE-2021-29265,CVE-2021-29650,CVE-2021-30002,CVE-2021-20292,CVE-2021-26930,CVE-2021-29264,CVE-2021-29265,CVE-2021-29650,CVE-2021-28688,CVE-2021-26931,CVE-2021-28038,CVE-2021-30002 - Linux kernel vulnerabilities - CVE-2020-25639,CVE-2021-28038,CVE-2021-28375,CVE-2021-28660,CVE-2021-29265,CVE-2021-29650,CVE-2021-30002,CVE-2021-29265,CVE-2021-28660,CVE-2021-28375,CVE-2021-30002,CVE-2020-25639,CVE-2021-28038,CVE-2021-29650 - Linux kernel (Raspberry Pi) vulnerabilities - CVE-2020-25639,CVE-2021-28038,CVE-2021-28375,CVE-2021-28660,CVE-2021-29265,CVE-2021-29650,CVE-2021-30002,CVE-2021-29265,CVE-2021-28660,CVE-2021-30002,CVE-2020-25639,CVE-2021-28038,CVE-2021-29650,CVE-2021-28375 - Linux kernel vulnerabilities - CVE-2020-25670,CVE-2020-25671,CVE-2020-25672,CVE-2020-25673,CVE-2021-28660,CVE-2021-28964,CVE-2021-28971,CVE-2021-28972,CVE-2021-29647,CVE-2021-31916,CVE-2021-33033,CVE-2021-3428,CVE-2021-3483,CVE-2021-31916,CVE-2021-3428,CVE-2020-25670,CVE-2020-25673,CVE-2020-25672,CVE-2021-28660,CVE-2021-28971,CVE-2021-28964,CVE-2021-29647,CVE-2021-3483,CVE-2021-33033,CVE-2020-25671,CVE-2021-28972 - Linux kernel vulnerabilities - CVE-2020-25670,CVE-2020-25671,CVE-2020-25672,CVE-2020-25673,CVE-2021-28688,CVE-2021-28950,CVE-2021-28964,CVE-2021-28971,CVE-2021-28972,CVE-2021-29264,CVE-2021-29647,CVE-2021-31916,CVE-2021-3483,CVE-2021-28950,CVE-2021-28972,CVE-2021-31916,CVE-2021-28964,CVE-2021-29647,CVE-2020-25670,CVE-2021-3483,CVE-2020-25673,CVE-2021-28688,CVE-2020-25671,CVE-2020-25672,CVE-2021-28971,CVE-2021-29264 - Linux kernel vulnerabilities - CVE-2021-3609,CVE-2021-3600,CVE-2021-23133,CVE-2021-23133,CVE-2021-3609,CVE-2021-3600 - Linux kernel (HWE) vulnerability - CVE-2021-3609 - Linux kernel vulnerabilities - CVE-2021-3609,CVE-2021-33200,CVE-2020-24586,CVE-2020-24587,CVE-2020-24588,CVE-2020-26139,CVE-2020-26141,CVE-2020-26145,CVE-2020-26147,CVE-2021-23133,CVE-2021-23134,CVE-2021-31829,CVE-2021-32399,CVE-2021-33034,CVE-2021-3506,CVE-2020-26139,CVE-2021-31829,CVE-2021-32399,CVE-2021-33200,CVE-2021-23134,CVE-2021-23133,CVE-2020-26147,CVE-2020-24587,CVE-2021-3506,CVE-2020-24588,CVE-2020-26145,CVE-2021-3609,CVE-2020-24586,CVE-2021-33034,CVE-2020-26141 - Linux kernel vulnerabilities - CVE-2021-33909,CVE-2021-33200,CVE-2020-24586,CVE-2020-24587,CVE-2020-26139,CVE-2020-26147,CVE-2020-26558,CVE-2021-0129,CVE-2021-23134,CVE-2021-31829,CVE-2021-32399,CVE-2021-33034,CVE-2021-0129,CVE-2020-24586,CVE-2021-33909,CVE-2021-23134,CVE-2021-33200,CVE-2021-33034,CVE-2020-26139,CVE-2020-26147,CVE-2020-24587,CVE-2021-31829,CVE-2020-26558,CVE-2021-32399 - Linux kernel vulnerabilities - CVE-2021-33909,CVE-2020-26558,CVE-2021-0129,CVE-2021-33909,CVE-2021-0129,CVE-2020-26558 - Linux kernel vulnerability - CVE-2021-33909 - LSN-0078-1: Kernel Live Patch Security Notice - CVE-2021-30498,CVE-2021-30499,CVE-2021-3753,CVE-2021-3743,CVE-2021-3739,CVE-2021-38198,CVE-2020-3702,CVE-2021-3732,CVE-2021-3679,CVE-2021-34556,CVE-2021-35477,CVE-2020-3702,CVE-2021-40490,CVE-2021-38198,CVE-2021-42008,CVE-2021-38166,CVE-2021-40490,CVE-2021-41991,CVE-2021-41991,CVE-2021-41990,CVE-2020-22617 - LSN-0079-1: Kernel Live Patch Security Notice - CVE-2021-30498,CVE-2021-30499,CVE-2021-3753,CVE-2021-3743,CVE-2021-3739,CVE-2021-38198,CVE-2020-3702,CVE-2021-3732,CVE-2021-3679,CVE-2021-34556,CVE-2021-35477,CVE-2020-3702,CVE-2021-40490,CVE-2021-38198,CVE-2021-42008,CVE-2021-38166,CVE-2021-40490,CVE-2021-41991,CVE-2021-41991,CVE-2021-41990,CVE-2020-22617 - LSN-0080-1: Kernel Live Patch Security Notice - CVE-2021-30498,CVE-2021-30499,CVE-2021-3753,CVE-2021-3743,CVE-2021-3739,CVE-2021-38198,CVE-2020-3702,CVE-2021-3732,CVE-2021-3679,CVE-2021-34556,CVE-2021-35477,CVE-2020-3702,CVE-2021-40490,CVE-2021-38198,CVE-2021-42008,CVE-2021-38166,CVE-2021-40490,CVE-2021-41991,CVE-2021-41991,CVE-2021-41990,CVE-2020-22617 - Linux kernel vulnerabilities - CVE-2021-3564,CVE-2021-3573,CVE-2021-3587,CVE-2021-3573,CVE-2021-3587,CVE-2021-3564 - Linux kernel vulnerabilities - CVE-2021-34693,CVE-2021-3564,CVE-2021-3573,CVE-2021-3587,CVE-2021-3573,CVE-2021-34693,CVE-2021-3587,CVE-2021-3564 - Linux kernel vulnerabilities - CVE-2021-3656,CVE-2021-3653,CVE-2020-36311,CVE-2021-22543,CVE-2021-3612,CVE-2020-36311,CVE-2021-22543,CVE-2021-3653,CVE-2021-3612,CVE-2021-3656 - Linux kernel vulnerabilities - CVE-2021-3656,CVE-2021-3653,CVE-2021-34693,CVE-2021-3612,CVE-2021-38160,CVE-2021-3612,CVE-2021-34693,CVE-2021-38160,CVE-2021-3656,CVE-2021-3653 - Linux kernel (GCP) vulnerabilities - CVE-2021-3656,CVE-2021-3653,CVE-2021-34693,CVE-2021-3612,CVE-2021-38160,CVE-2021-38160,CVE-2021-3656,CVE-2021-3653,CVE-2021-34693,CVE-2021-3612 - Linux kernel (HWE) vulnerabilities - CVE-2021-3656,CVE-2021-3653,CVE-2020-36311,CVE-2021-22543,CVE-2021-3612,CVE-2021-3656,CVE-2021-3612,CVE-2021-3653,CVE-2020-36311,CVE-2021-22543 Modifications: - Include dependency packages to support current Teradici PCoIP Client installation - Translations for ThinPro 7.2 SP5 - libmanticore-client.so: registration of the QLocalSocket's and QAbstractSocket's meta-types SP5.5 ------ Bug Fixes: - Fixed an issue which could cause Gateway settings to be reverted to default after reboot when connected with WLAN - Fixed an issue which Citrix General Setting UI does not display "Apply" button at default 150% scaled view - Fixed an issue with ThinPro 7.2 installation with PC Converter deployment tool when booting to USB Storage device - Fixed some instances of AltGr + Key combinations with related Keyboard layouts resulting with wrong key value in local and Citrix - Fixed an issue with Numeric Pad Decimal"." separator of Switzerland France Key layout output wrong key value "," in local - Fixed an issue with Some Caps + Base key of Switzerland France Key layout output wrong key value in local and Citrix - Fixed an issue which Auto Update required manual action to click OK - Fixed an issue which primary display may not be configurable when the monitor is connected with the mobile device lid closed Security Updates: - WebKitGTK vulnerability - CVE-2020-13558 - OpenSSL vulnerabilities - CVE-2021-23840,CVE-2021-23841,CVE-2021-23841,CVE-2021-23840 - xterm vulnerability - CVE-2021-27135 - Python regression - CVE-2021-3177,CVE-2020-27619,CVE-2021-3177 - Python 2.7 vulnerability - CVE-2021-3177,CVE-2021-3177,CVE-2020-27619,CVE-2021-3177,CVE-2021-3177 - libzstd vulnerabilities - CVE-2021-24031,CVE-2021-24032 - GLib vulnerabilities - CVE-2021-27218,CVE-2021-27219,CVE-2021-27218,CVE-2021-27219 - GLib vulnerability - CVE-2021-28153 - ldb vulnerabilities - CVE-2021-20277,CVE-2020-27840,CVE-2021-20277,CVE-2020-27840 - OpenSSL vulnerability - CVE-2021-3449 - WebKitGTK vulnerabilities - CVE-2021-1765,CVE-2020-27918,CVE-2021-1870,CVE-2021-1801,CVE-2020-29623,CVE-2021-1789,CVE-2021-1799 - GStreamer Good Plugins vulnerabilities - CVE-2021-3497,CVE-2021-3498,CVE-2021-3498,CVE-2021-3497 - WebKitGTK vulnerabilities - CVE-2021-1871,CVE-2021-1844,CVE-2021-1788 - GStreamer Base Plugins vulnerability - CVE-2021-3522 - LZ4 vulnerability - CVE-2021-3520 - libwebp vulnerabilities - CVE-2020-36331,CVE-2018-25010,CVE-2018-25011,CVE-2020-36330,CVE-2020-36329,CVE-2018-25013,CVE-2018-25009,CVE-2020-36332,CVE-2020-36328,CVE-2018-25014,CVE-2018-25012 - BlueZ vulnerabilities - CVE-2020-26558,CVE-2020-27153,CVE-2021-3588,CVE-2021-3588,CVE-2020-26558,CVE-2020-27153 - Nettle vulnerabilities - CVE-2021-3580,CVE-2018-16869,CVE-2018-16869,CVE-2021-3580 Modifications: - Add support for Realtek 8852AE Wi-Fi 6 - Translations for ThinPro 7.2 SP4.8 SP4.8 ------ Bug Fixes: - Fixed an issue which would leave the system in an unusable state after leaving Imprivata Mode until reboot. - Fixed an issue wherein USB devices that were disabled would still be usable by the system. - Fixed an issue with connections on the desktop when in domain mode. - Fixed an issue with the taskbar not being on the correct display when closing and opening a laptop lid. - Fixed an issue with the taskbar disappearing when using Easy Update. - Fixed an issue with touchscreens when joining a domain. - Fixed an issue with scaling on displays with small resolutions, such as 1024x768. - Fixed an issue with VNC connections being unstable. - Fixed a stability issue with Easy Update. - Fixed an issue with the wireless icon when connecting to a network. - Fixed a permission issue with the control panel when logged in as a domain admin. - Fixed an issue with missing network icons when logged into a domain. - Fixed an issue with Imprivata not loading correctly on first boot. SP3.5 ------ Bug Fixes: - Fixed an issue around desktop usability when the display is scaled. - Fixed an issue with configuring displays under certain conditions. - Fixed an issue wherein the brightness was set incorrectly on reboot. - Fixed an issue with information logged in an Imprivata session. - Fixed an issue with Auto Update when the short name of an ftp server is used. - Fixed an issue related to desktop usability in Smart Zero mode when the display is scaled. - Fixed an issue with network information displayed in System Information when using a USB-C to RJ45 adapter. - Fixed an issue with network information displayed in System Information when connected via WiFi. - Fixed an issue with auto update when deploying a certificate. - Fixed an issue with connections configured to auto-start not waiting for networking. - Fixed an issue with audio devices not being recognized correctly when connecting to the 3.5mm Microphone Jack on the t630. - Fixed an issue where the networking status may show as limited when connected to a WiFi network. - Fixed an issue that caused a Citrix session to freeze, disappear, or disconnect intermittently. Security Updates: - CVE-2021-33203,CVE-2021-31916,CVE-2021-3428,CVE-2020-25670,CVE-2021-28972,CVE-2021-29647,CVE-2021-28971,CVE-2021-29155,CVE-2021-3501,CVE-2021-31829,CVE-2021-28950,CVE-2021-28972,CVE-2021-31916,CVE-2021-28651, CVE-2021-28652,CVE-2021-31806,CVE-2021-3560,CVE-2020-25673,CVE-2021-3501,CVE-2021-29155 Modifications: - Add support for specifying the domain in the username field when logging into a connection, for example: "mydomain\user". This can be configured by modifying "loginfields/domainAwareUsername" under a particular connection in root/ConnectionType. SP2.6 ----- Bug Fixes: - Fixed an issue with auto-starting connections - Fixed an issue where sometimes ThinPro would take a while to reboot - Fixed multiple issues around display scaling - Fixed an issue with usb-update being usable before it was intended to be on first boot. - Fixed an issue with battery charge indicator on some third-party platforms. - Fixed an issue with displays causing unexpected resolution changes when displays are set to mirror each other. - Fixed an issue with system log being filled with repeated messages under certain senarios. - Fixed an issue wherein certain updates could not be installed via auto-update. - Fixed an issue where the Timezone could not be correctly set. - Fixed an issue where icons on the desktop will be missing their picture under certain scenarios. - Fixed an issue when connecting to a VMware View Resource via Imprivata, an unexpected dialog may pop up. Security Updates: - CVE-2021-28965,CVE-2020-36314,C:wVE-2021-24000,CVE-2021-23996,CVE-2021-23997,CVE-2021-28963,CVE-2019-14513,CVE-2017-15107,CVE-2021-28211,CVE-2021-28210,CVE-2021-28965,CVE-2021-3410,CVE-2021-1252,CVE-2021-1404,CVE-2021-1405 - Linux kernel vulnerabilities - CVE-2021-1052,CVE-2021-1053,CVE-2021-1056,CVE-2021-1052,CVE-2021-1053,CVE-2021-1056,CVE-2020-28374,CVE-2021-1052,CVE-2021-1053,CVE-2021-1056,CVE-2021-1053,CVE-2021-1052,CVE-2020-28374,CVE-2020-25704,CVE-2020-28374,CVE-2020-25704,CVE-2020-25704,CVE-2020-28374 - QEMU vulnerabilities - CVE-2020-11947,CVE-2020-15859,CVE-2020-27821,CVE-2020-28916,CVE-2020-29443,CVE-2021-20181,CVE-2020-15859,CVE-2020-27821,CVE-2020-28916,CVE-2020-29443,CVE-2020-11947,CVE-2021-20181 Modifications: - Added a new feature to disable the search functionality in ThinPro's taskbar menu. This is exposed as a new registry key: root/Daskboard/GUI/SearchBox. Setting this to 0 will disable the search box in user mode. - Added ability to connect to guest wifi networks through Captive Portal. To enable this, a new registry key has been exposed: root/Network/Wireless/CaptivePortal. Setting this to 1 will enable Captive Portal support. A checkbox has also been added to the user interface when configuring the wireless network. This setting should only be enabled when connecting to a guest network. SP1.6 ----- New Features: Bug Fixes: - Fixed an issue pertaining to credential configuration with the Connection Manager. - Fixed an issue where webcams were not used consistently with ZCentral Remote Boost. - Fixed an issue preventing Auto-Update from installing components. - Fixed multiple issues around display scaling. Security Updates: - xdg-utils regression - CVE-2020-27748 - coTURN vulnerability - CVE-2020-26262 - Open vSwitch vulnerabilities - CVE-2015-8011,CVE-2020-27827 - tar vulnerabilities - CVE-2018-20482,CVE-2019-9923,CVE-2018-20482,CVE-2019-9923 - HTMLDOC vulnerability - CVE-2019-19630 - Pillow vulnerabilities - CVE-2020-35653,CVE-2020-35654,CVE-2020-35655,CVE-2020-35655,CVE-2020-35654,CVE-2020-35653 - Apache Log4net vulnerability - CVE-2018-1285 - Dnsmasq vulnerabilities - CVE-2020-25681,CVE-2020-25687,CVE-2020-25682,CVE-2020-25683,CVE-2020-25684,CVE-2020-25685,CVE-2020-25686,CVE-2019-14834,CVE-2020-25684,CVE-2020-25683,CVE-2020-25686,CVE-2020-25687,CV E-2020-25681,CVE-2019-14834,CVE-2020-25682,CVE-2020-25685 - PyXDG vulnerability - CVE-2019-12761 - NVIDIA graphics drivers vulnerabilities - CVE-2021-1052,CVE-2021-1053,CVE-2021-1056,CVE-2021-1053,CVE-2021-1052 - Sudo vulnerabilities - CVE-2021-3156,CVE-2021-23239,CVE-2021-3156,CVE-2021-23239 - Apport vulnerabilities - CVE-2021-25682,CVE-2021-25683,CVE-2021-25684,CVE-2021-25683,CVE-2021-25682,CVE-2021-25684 - ca-certificates update Modifications: - Added a new option to control what ThinPro does when the administrator switches back to user. This option can be configured either via the Customization center or via mclient by setting the appropriate value to: root/users/root/switchToUserAction to one of the following values: - Logout (default) - Reboot - None