Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

HP ThinPro 8.0 Service Pack 3 Released

HP has released a new service pack for the ThinPro 8 platform.

PLATFORM:

  • ThinPro 8

SP3 (v3.8)

Bug Fixes:

  • Enabled mt45 two finger scroll and tap actions
  • Time zone for Turkey was set to UTC+2:00 instead of UTC+3:00
  • Fixed the importation of .crt certificates from Automatic Update or a ThinPro configuration file (profile.xml)

Security Updates:

  • Docker vulnerability – CVE-2021-41092
  • ICU vulnerability – CVE-2021-30535
  • systemd vulnerability – CVE-2021-3997
  • util-linux vulnerabilities – CVE-2021-3995,CVE-2021-3996
  • Speex vulnerability – CVE-2020-23903
  • cryptsetup vulnerability – CVE-2021-4122
  • Cyrus SASL vulnerability – CVE-2022-24407
  • PolicyKit vulnerability – CVE-2021-4115
  • virglrenderer vulnerabilities – CVE-2022-0135,CVE-2022-0175,CVE-2022-0175,CVE-2022-0135
  • GNU C Library vulnerabilities – CVE-2016-10228,CVE-2019-25013,CVE-2020-27618,CVE-2020-29562,CVE-2021-3326,CVE-2020-6096,CVE-2021-27645,CVE-2021-35942,CVE-2021-3998,CVE-2021-3999,CVE-2022-23218,CVE-2022-23219,CVE-2021-3999,CVE-2021-35942,CVE-2019-25013,CVE-2022-23219,CVE-2021-3998,CVE-2016-10228,CVE-2020-29562,CVE-2021-3326,CVE-2020-27618,CVE-2021-27645,CVE-2022-23218,CVE-2020-6096
  • tar vulnerability – CVE-2021-20193
  • FriBidi vulnerabilities – CVE-2022-25308,CVE-2022-25309,CVE-2022-25310,CVE-2022-25310,CVE-2022-25308,CVE-2022-25309
  • libarchive vulnerability – CVE-2022-26280
  • XZ Utils vulnerability – CVE-2022-1271
  • Gzip vulnerability – CVE-2022-1271
  • klibc vulnerabilities – CVE-2021-31870,CVE-2021-31871,CVE-2021-31872,CVE-2021-31873,CVE-2021-31870,CVE-2021-31872,CVE-2021-31873,CVE-2021-31871
  • Bash vulnerability – CVE-2019-18276
  • libinput vulnerability – CVE-2022-1215
  • libsepol vulnerabilities – CVE-2021-36084,CVE-2021-36085,CVE-2021-36086,CVE-2021-36087,CVE-2021-36086,CVE-2021-36085,CVE-2021-36084,CVE-2021-36087
  • networkd-dispatcher regression – CVE-2022-29799,CVE-2022-29800
  • Rsyslog vulnerability – CVE-2022-24903
  • Dnsmasq vulnerability – CVE-2022-0934
  • containerd regression – CVE-2022-23648
  • OpenLDAP vulnerability – CVE-2022-29155
  • Apport vulnerabilities – CVE-2021-3899,CVE-2022-1242,CVE-2022-28652,CVE-2022-28654,CVE-2022-28655,CVE-2022-28656,CVE-2022-28657,CVE-2022-28658,CVE-2022-28652,CVE-2022-28658,CVE-2022-28655,CVE-2022-28654,CVE-2021-3899,CVE-2022-28657,CVE-2022-28656,CVE-2022-1242
  • dpkg vulnerability – CVE-2022-1664
  • E2fsprogs vulnerability – CVE-2022-1304
  • BlueZ vulnerabilities
  • GnuPG vulnerability – CVE-2022-34903
  • OpenSSL vulnerability – CVE-2022-2097
  • NSS vulnerabilities – CVE-2022-22747,CVE-2022-34480,CVE-2022-22747,CVE-2022-34480
  • Python vulnerability – CVE-2015-20107
  • HarfBuzz vulnerability – CVE-2022-33068
  • PyJWT vulnerability – CVE-2022-29217
  • FreeType vulnerabilities – CVE-2022-27405,CVE-2022-27406,CVE-2022-27404,CVE-2022-31782
  • protobuf-c vulnerability – CVE-2022-33070,CVE-2022-33070
  • Net-SNMP vulnerabilities – CVE-2022-24806,CVE-2022-24808,CVE-2022-24809,CVE-2022-24805,CVE-2022-24810,CVE-2022-24807
  • libxml2 vulnerability – CVE-2016-3709
  • GnuTLS vulnerabilities – CVE-2021-4209,CVE-2022-2509,CVE-2021-4209,CVE-2022-2509
  • Libxslt vulnerabilities – CVE-2019-5815,CVE-2021-30560,CVE-2019-5815,CVE-2021-30560
  • poppler vulnerability – CVE-2022-38784
  • GDK-PixBuf vulnerability – CVE-2021-44648
  • Wayland vulnerability – CVE-2021-3782
  • Vim regression – CVE-2022-0943,CVE-2022-1154,CVE-2022-1420,CVE-2022-1616,CVE-2022-1619,CVE-2022-1620,CVE-2022-1621,CVE-2022-0943,CVE-2022-1154,CVE-2022-1620,CVE-2022-1420,CVE-2022-1619,CVE-2022-1616,CVE-2022-1621
  • Bind vulnerabilities – CVE-2022-2795,CVE-2022-2881,CVE-2022-2906,CVE-2022-3080,CVE-2022-38177,CVE-2022-38178,CVE-2022-3080,CVE-2022-2881,CVE-2022-38177,CVE-2022-2906,CVE-2022-38178,CVE-2022-2795
  • PCRE vulnerabilities – CVE-2022-1586,CVE-2022-1587
  • libjpeg-turbo vulnerabilities – CVE-2018-11813,CVE-2020-17541,CVE-2020-35538,CVE-2021-46822,CVE-2020-35538,CVE-2021-46822,CVE-2020-17541,CVE-2018-11813
  • Ghostscript vulnerabilities – CVE-2020-27792,CVE-2022-2085,CVE-2022-2085,CVE-2020-27792
  • DHCP vulnerabilities – CVE-2022-2928,CVE-2022-2929,CVE-2022-2929,CVE-2022-2928
  • GMP vulnerability – CVE-2021-43618
  • unzip vulnerabilities – CVE-2021-4217,CVE-2022-0529,CVE-2022-0530,CVE-2022-0529,CVE-2021-4217,CVE-2022-0530
  • Heimdal vulnerabilities – CVE-2018-16860,CVE-2019-12098,CVE-2021-3671,CVE-2022-3116,CVE-2018-16860,CVE-2022-3116,CVE-2019-12098,CVE-2021-3671
  • zlib vulnerability – CVE-2022-37434
  • Libksba vulnerability – CVE-2022-3515
  • Perl vulnerability – CVE-2020-16156
  • curl vulnerabilities – CVE-2022-32221,CVE-2022-35260,CVE-2022-42915,CVE-2022-42916,CVE-2022-32221,CVE-2022-35260,CVE-2022-42916,CVE-2022-42915
  • DBus vulnerabilities – CVE-2022-42010,CVE-2022-42011,CVE-2022-42012,CVE-2022-42010,CVE-2022-42012,CVE-2022-42011
  • SQLite vulnerability – CVE-2022-35737
  • pixman vulnerability – CVE-2022-44638
  • LibTIFF vulnerabilities – CVE-2022-2519,CVE-2022-2520,CVE-2022-2521,CVE-2022-2953,CVE-2022-2867,CVE-2022-2868,CVE-2022-2869,CVE-2022-34526,CVE-2022-3570,CVE-2022-3598,CVE-2022-3599,CVE-2022-3597,CVE-2022-3626,CVE-2022-3627,CVE-2022-2869,CVE-2022-3627,CVE-2022-2519,CVE-2022-34526,CVE-2022-2867,CVE-2022-2520,CVE-2022-2521,CVE-2022-3570,CVE-2022-3626,CVE-2022-3597,CVE-2022-2868,CVE-2022-2953,CVE-2022-3599,CVE-2022-3598
  • WebKitGTK vulnerabilities – CVE-2022-42823,CVE-2022-32923,CVE-2022-32888,CVE-2022-42824,CVE-2022-42799
  • Expat vulnerabilities – CVE-2022-43680,CVE-2022-43680,CVE-2022-40674
  • snapd vulnerabilities – CVE-2021-3155,CVE-2021-4120,CVE-2021-44730,CVE-2021-44731,CVE-2021-3155,CVE-2021-4120,CVE-2021-44730,CVE-2021-44731
  • snapd vulnerabilities – CVE-2021-3155,CVE-2021-4120,CVE-2021-44730,CVE-2021-44731,CVE-2021-44730,CVE-2021-44731,CVE-2021-4120,CVE-2021-3155
  • snapd regression – CVE-2021-3155,CVE-2021-4120,CVE-2021-44730,CVE-2021-44731

Modifications:

  • HP ThinPro 8.0 SP3 and later versions support HP USB-C Dock G5 (1,2) with mt440, mt645, and t655
  • HP ThinPro 8.0 SP3 and later versions support HP Thunderbolt G4 Dock (1,2) with mt645
  • HP ThinPro 8.0 SP3 and later versions partially support HP E24mG4, E24uG4, E27mG4, and E27uG4 FHD USB-C Conferencing Monitors (1,3) with mt440, mt645, t550, and t655
  • Enhanced Imprivata ProveID Embedded agent registry settings
    • New registry setting: root/Imprivata/SysInfo/exit-target to execute by default the actions defined under /usr/lib/imprivata-helper/exit-actions.d/ upon an exit of the ProveID Embedded agent.
    • Gave to the registry keys under root/Imprivata/Imprivata.conf/ the ability to override /usr/lib/imprivata/runtime/etc/Imprivata.conf.
  • Enhanced regeditor
    • Regeditor now displays the directory key descriptions.
    • Revisited the regeditor’s right click menu and its actions.
    • Translations for ThinPro 8.0 SP2
  • Disclaimers
    • Docks, Displays, and peripherals sold separately.
    • Dock firmware can be updated for users of HP ThinPro 8.0 SP3 and later versions.
    • Monitor firmware updates are possible only by using a connected device using Microsoft Windows OS.

Release Notes:

http://ftp.ext.hp.com//pub/tcdebian/updates/8.0.0/service_packs/ThinPro8.0_SP-3.8-signed.txt

Download the service pack through HP Thin Update or by using HP Update Center from HP Device Manager.

Was this post helpful?

HP ThinPro 8.0 Service Pack 3 Released