
Citrix Workspace app is a new client from Citrix that works similar to Citrix Receiver and is fully. While you can still download older versions of Citrix Receiver, new features and enhancements will be released for Citrix Workspace app. Updates to close the vulnerabilities are available for the affected products. Beginning August 2018, Citrix Receiver will be replaced by Citrix Workspace app.
#Citrix viewer update how to#
Click on Window button to shrink the Citrix Desktop Viewer Window so you can adjust the size. Download the Citrix Workspace app for any device with a Windows, Mac, or Chrome operating system, and learn how to install the Citrix Workspace app in three. The vendor specifies in the security bulletin exactly which products and product versions are affected. Next you will move your mouse to the top of the screen and click on the black rectangle to show the drop down menu.
#Citrix viewer update code#
This issue belongs to a type known as "speculative execution attacks." The vulnerability allows malicious code running on a CPU to derive the value of registers or memory belonging to other processes running on that CPU. Although not an issue in the Citrix Hypervisor product itself, Citrix is issuing hotfixes that also address this CPU issue.
#Citrix viewer update update#
XenApp/XenDesktop 7.15 LTSR Cumulative Update 8 comes with Citrix Group Policy Management. Citrix Virtual Apps and Desktops (CVAD) 1912 LTSR CU4 comes with Citrix Group Policy Management.

The vulnerabilities have been assigned CVEs CVE-2021-27379 and CVE-2021-28692.Īnother issue involves the underlying CPU hardware. Citrix Virtual Apps and Desktops (CVAD) 2109 comes with Citrix Group Policy Management 7.31.0.12. These two issues only affect systems where the malicious guest VM has a physical PCI device passed to it by the host administrator. Two of these vulnerabilities each allow privileged code in a guest VM to cause the host to crash or become unresponsive. Several security issues have been identified in the Citrix Hypervisor, which are described in security bulletin CTX316324. German log reader 1ST1 was kind enough to point out these security bulletins and updates in this comment.
