Commit Graph

9655 Commits

Author SHA1 Message Date
Peter Müller
4eb92c5ab1 Core Update 166: Delete leftovers from LFS rootfile updates
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-24 19:05:35 +00:00
Peter Müller
729b27da0d Core Update 166: Ship zlib
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-24 18:59:48 +00:00
Stefan Schantl
abf148cebd rules.pl: Fix creating rules for location based groups.
The former used hash value only contains the country code when
a rule for a single country should be created.

In case a location group is used the hash value refers to the group name,
which does not work here.

The required country code is part of the processed string and can be omitted
from here. This works well for single codes and location groups, because those
are processed in a loop.

Fixes #12809.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-23 17:12:37 +00:00
Michael Tremer
77e3829dc1 linux-firmware: Compress firmware on disk
This patch enabled that we can compress any firmware files on disk. This
will save some space since /lib/firmware is becoming larger with every
release.

From formerly 828MiB, this is now using ~349MiB which is a saving of
about 480MiB on disk. This is helping us a lot fighting to contain the
distribution to 2GB on /.

Some other firmware that is installed in other packages is not
compressed with this patch which is a bit sad, but potentially not worth
the effort.

In order to ship this change with a Core Update, it might be intuitive
to remove /lib/firmware first and then extract the new update with all
new files. However, I do not know if this all will compress as well as
before since now the files are already individually compressed. It might
be a challenge to ship this.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-23 16:11:14 +00:00
Peter Müller
e68cfdb140 Core Update 166: Ship bind
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-23 09:42:57 +00:00
Matthias Fischer
5019469505 bind: Update to 9.16.27
For details see:
https://downloads.isc.org/isc/bind9/9.16.27/doc/arm/html/notes.html#notes-for-bind-9-16-27

"Security Fixes

    The rules for acceptance of records into the cache have been
    tightened to prevent the possibility of poisoning if forwarders send
    records outside the configured bailiwick. (CVE-2021-25220)

    ISC would like to thank Xiang Li, Baojun Liu, and Chaoyi Lu from
    Network and Information Security Lab, Tsinghua University, and
    Changgen Zou from Qi An Xin Group Corp. for bringing this
    vulnerability to our attention. [GL #2950]

    TCP connections with keep-response-order enabled could leave the TCP
    sockets in the CLOSE_WAIT state when the client did not properly
    shut down the connection. (CVE-2022-0396) [GL #3112]

Feature Changes

    DEBUG(1)-level messages were added when starting and ending the BIND
    9 task-exclusive mode that stops normal DNS operation (e.g. for
    reconfiguration, interface scans, and other events that require
    exclusive access to a shared resource). [GL #3137]

Bug Fixes

    The max-transfer-time-out and max-transfer-idle-out options were not
    implemented when the BIND 9 networking stack was refactored in 9.16.
    The missing functionality has been re-implemented and outgoing zone
    transfers now time out properly when not progressing. [GL #1897]

    TCP connections could hang indefinitely if the other party did not
    read sent data, causing the TCP write buffers to fill. This has been
    fixed by adding a “write” timer. Connections that are hung while
    writing now time out after the tcp-idle-timeout period has elapsed.
    [GL #3132]

    The statistics counter representing the current number of clients
    awaiting recursive resolution results (RecursClients) could
    be miscalculated in certain resolution scenarios, potentially
    causing the value of the counter to drop below zero. This has been
    fixed. [GL #3147]"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-23 09:42:41 +00:00
Peter Müller
b889a5004a Core Update 166: Ship rrdtool
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-23 09:42:17 +00:00
Matthias Fischer
24005371e1 rrdtool: Update to 1.8.0
For details see:
https://github.com/oetiker/rrdtool-1.x/releases/tag/v1.8.0

"Bugfixes

    python bindings: properly convert double values of rrd info
    failed to expand 'Py_UNUSED', Invalid usage when expanding 'Py_UNUSED'
    document --showtime in xport help output
    fix --use-nan-for-all-missing-data
    update rrdruby.pod
    add missing rrdruby.pod and rrdpython.pod to dist
    Set first_weekday to 0 (Sunday), when HAVE__NL_TIME_WEEK_1STDAY is not defined
    fix median calculation for all NaN inputs
    fix potential leak in xport during failure
    fix many warnings raised by Cppcheck
    fix many compiler warnings from latest gcc
    ensure proper initialization in rrd_daemon
    cleanup testsuite
    better testing
    avoid invalid read in rrd_client
    add symbols from rrdc to librrd
    Fix duplicate write_changes_to_disk() calls when HAVE_LIBRADOS is true and HAVE_MMAP is false
    documentation updates
    for SMIN example in docs
    fix for pyton3 compatibility
    freemem only for valid status <Christian Kr"oger>
    fix double meaning of time 0 as uninitialized value
    fix for zfs not supporting fallocate. this makes resize work on zfs
    add rrdrados.pod to dist
    fetch - do not call rrd_freemem on uninitialized pointers
    use separate pango fontmap per thread
    switch to python 3
    do not leak filename when opening a broken file
    fix leaks in rrdcached
    avoid segfault when flushing cache
    escape json in legend entries
    fix leak in xport
    make rrdcgi param parsing more robust
    fix race in journal_write"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-23 09:41:57 +00:00
Peter Müller
afd8dc466b Nmap: Update to 7.92
Please refer to https://nmap.org/changelog#7.92 for the changelog of
this version; it is too long to include it here.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-22 17:35:52 +00:00
Peter Müller
b5abd5ccd3 Core Update 166: There is no need for /dev/null in that GPG call
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-22 17:35:11 +00:00
Peter Müller
90f03efea5 Core Update 166: Introduce new 2022 Pakfire key
Cc: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-22 17:34:30 +00:00
Peter Müller
fa0a7c038c Core Update 166: Perform spring clean of orphaned files
On an IPFire installation that has been around since Core Update 110
(released April 28, 2017), these files have been identified as being
orphaned, comparing to a fresh installation of Core Update 164.

To avoid such a list of files agglomerating, persons responsible for a
Core Update should check whether an updated package contains deleted
files in its rootfile. If so, they should be deleted on existing systems
via update.sh as well.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-22 17:33:51 +00:00
Peter Müller
5a33fd9bc6 Nano: Braindead me overlooked the rootfiles were misplaced
This was introduced in b1c25d7a84, and
subsequently broke the nightly builds, and I failed to spot this in the
first place. :-/

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-22 07:51:17 +00:00
Peter Müller
7751dcccdd Core Update 166: Ship misc-progs
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-21 21:38:37 +00:00
Peter Müller
f1269489e8 Core Update 166: Drop Pakfire metadata for Nano, which is now part of the core system
Cc: Michael Tremer <michael.tremer@ipfire.org>
Cc: Jon Murphy <jon.murphy@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-21 19:10:06 +00:00
Peter Müller
451cf01677 Core Update 166: Ship and restart strongSwan
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-03-21 19:04:11 +00:00
Jon Murphy
b1c25d7a84 Nano: Move nano editor from packages to core system
- this will not change the default editor `vim`

Signed-off-by: Jon Murphy <jon.murphy@ipfire.org>
Acked-by: Peter Müller <peter.mueller@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-21 19:01:43 +00:00
Peter Müller
219a998412 Core Update 166: Drop old 2007 Pakfire key, and remove it from existing installations
It is not necessary to have this key present on IPFire systems anymore,
since it has not been in use for years, and we can expect systems to be
sufficiently up-to-date, so they no longer need to rely on old updates
or add-ons signed with this key.

Also, given the current key was generated in 2018, we should consider a
Pakfire key rollover soon.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-21 11:46:36 +00:00
Michael Tremer
5e5ee28234 core166: Ship /etc/inittab.d
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-21 08:51:51 +00:00
Adolf Belka
a1e9afcbaf sysvinit: Update rootfile to fix bug 12797
- In sysvinit-2.97 (Dec2020) a patch was added which allows init to load configuration data
   from files stored in /etc/inittab.d/
   This modification would have come in with Core Update 155.
- When sysvinit was updated from 2.88dsf to 2.98 the /etc/inittab.d/ directory in the
   rootfile was commented out.
  Sysvinit looks to see if there are any files in inittab.d but as that directory does not
   exist then the message "No inittab.d directory found" is written during the boot and is
   also shown in the log summary.
- This patch uncomments the directory so that it will be present. No files will be placed
   in it but its prescence will stop the error message being shown during boot.

Fixes: Bug #12797
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-21 08:51:22 +00:00
Michael Tremer
bfde1c5af3 core166: Drop openvpn-ccd-convert script from all installations
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-21 08:50:56 +00:00
Peter Müller
0b6d12adae Drop orphaned ovpn-ccd-convert script
This script appeared in the rootfiles for Core Updates 65 and 66, being
released in late 2012 and early 2013. It is not used elsewhere, and
there is no sense in keeping it around on IPFire installations.

Should this patch be accepted, a corresponding 'rm' statement is
necessary in the update.sh script of the Core Update it will go into.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-21 08:50:30 +00:00
Michael Tremer
0ad14f4d83 core166: Ship psmisc
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-20 15:21:25 +00:00
Peter Müller
2c76a05566 psmisc: Update to 23.4
Please refer to https://gitlab.com/psmisc/psmisc/-/tags for an overview
of the changes happened since version 22.2 .

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-20 15:20:52 +00:00
Michael Tremer
16fa9ed5e5 core166: Ship connections.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-20 15:20:13 +00:00
Michael Tremer
da4ff2f6a9 core166: Ship apache2
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-17 16:45:00 +00:00
Michael Tremer
b1b1cb344b reiserfsprogs: Drop redundant rootfile for aarch64
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-16 15:42:16 +00:00
Stefan Schantl
10beae64bf ids-functions.pl: Skip deleted.rules files
These rulefiles are used by various providers as a kind of reference and
to store rules which have been taken out for correctness, performance
reasons or because of other reasons.

Fixes #12794.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-15 17:52:27 +00:00
Michael Tremer
e49e25ba69 core166: Ship openssl
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-15 17:51:59 +00:00
Michael Tremer
bac517874e openssl: Update to 1.1.1n
OpenSSL Security Advisory [15 March 2022]
============================================

Infinite loop in BN_mod_sqrt() reachable when parsing certificates
(CVE-2022-0778)
==================================================================================

Severity: High

The BN_mod_sqrt() function, which computes a modular square root,
contains
a bug that can cause it to loop forever for non-prime moduli.

Internally this function is used when parsing certificates that contain
elliptic curve public keys in compressed form or explicit elliptic curve
parameters with a base point encoded in compressed form.

It is possible to trigger the infinite loop by crafting a certificate
that
has invalid explicit curve parameters.

Since certificate parsing happens prior to verification of the
certificate
signature, any process that parses an externally supplied certificate
may thus
be subject to a denial of service attack. The infinite loop can also be
reached when parsing crafted private keys as they can contain explicit
elliptic curve parameters.

Thus vulnerable situations include:

 - TLS clients consuming server certificates
 - TLS servers consuming client certificates
 - Hosting providers taking certificates or private keys from customers
 - Certificate authorities parsing certification requests from
   subscribers
 - Anything else which parses ASN.1 elliptic curve parameters

Also any other applications that use the BN_mod_sqrt() where the
attacker
can control the parameter values are vulnerable to this DoS issue.

In the OpenSSL 1.0.2 version the public key is not parsed during initial
parsing of the certificate which makes it slightly harder to trigger
the infinite loop. However any operation which requires the public key
from the certificate will trigger the infinite loop. In particular the
attacker can use a self-signed certificate to trigger the loop during
verification of the certificate signature.

This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0.  It was
addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022.

OpenSSL 1.0.2 users should upgrade to 1.0.2zd (premium support customers
only)
OpenSSL 1.1.1 users should upgrade to 1.1.1n
OpenSSL 3.0 users should upgrade to 3.0.2

This issue was reported to OpenSSL on the 24th February 2022 by Tavis
Ormandy
from Google. The fix was developed by David Benjamin from Google and
Tomáš Mráz
from OpenSSL.

Note
====

OpenSSL 1.0.2 is out of support and no longer receiving public updates.
Extended
support is available for premium support customers:
https://www.openssl.org/support/contracts.html

OpenSSL 1.1.0 is out of support and no longer receiving updates of any
kind.
It is affected by the issue.

Users of these versions should upgrade to OpenSSL 3.0 or 1.1.1.

References
==========

URL for this Security Advisory:
https://www.openssl.org/news/secadv/20220315.txt

Note: the online version of the advisory may be updated with additional
details
over time.

For details of OpenSSL severity classifications please see:
https://www.openssl.org/policies/secpolicy.html

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-15 17:51:13 +00:00
Michael Tremer
b28f36faa5 core166: Rebuild IPS rules
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-14 15:54:04 +00:00
Stefan Schantl
f349c960e4 ids-functions.pl: Do not longer extract all rulefiles in archive.
Only extract rulefiles which are located in a rules directory and/or in the archive
root.

This prevents us from extracting experimental or binary rules etc. which
often are located in corresponding sub-directories.

Reference: #12794.

Signed-off-by: Stefan Schantl <stefan.schantl@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-14 15:45:00 +00:00
Michael Tremer
f5c9297fd7 core166: Ship changes files
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-14 15:25:12 +00:00
Michael Tremer
b45c52760b core166: Ship dracut
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-14 15:24:19 +00:00
Michael Tremer
e77d960bac firewall: Make blocking all traffic impossible on HOSTILE
The current setup can fail and block all traffic on RED if the RETURN
rules could not be created.

This can happen when the kernel fails to load the ipset module, as it is
the case after upgrading to a new kernel. Restarting the firewall will
cause that the system is being cut off the internet.

This design now changes that if those rules cannot be created, the
DROP_HOSTILE feature is just inactive, but it would not disrupt any
traffic.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Daniel Weismüller <daniel.weismueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-14 15:19:12 +00:00
Michael Tremer
46b8eb9e7f rebuild-initrd: Drop unused script
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-14 15:18:21 +00:00
Michael Tremer
d8db858769 dracut: Install an IPFire system configuration file
This file contains our custom settings:

* Always load microcodes as early as possible

* We now compress the initrd using Zstandard which is substanstically
  faster than XZ, but offers better compression ratios

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-14 15:18:21 +00:00
Michael Tremer
2f74ea9347 dracut: Update to 056
This one was desperately in need of an upgrade, as dracut 038 was
released 8 YEARS ago. Hence, the changelog since is way too long to
include it here; refer to https://git.kernel.org/pub/scm/boot/dracut/dracut.git/tree/NEWS.md
for details.

See also: #12773

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-14 15:18:21 +00:00
Matthias Fischer
34a7a97dcd ids: Fixed typo in ruleset-sources
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-14 15:15:57 +00:00
Michael Tremer
65030c233b Revert "aws-cli: Update to version 1.22.64"
This reverts commit e42665e594.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-11 16:34:36 +00:00
Michael Tremer
9976ffaa43 samba: Update rootfile on aarch64
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-11 16:05:28 +00:00
Michael Tremer
a17d3aaaea stage2: Update rootfiles
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-11 16:04:09 +00:00
Daniel Weismueller
d6b2b662da Add backup/include for cups
To solve the behavior discribed in bug 12404 I added the path
 /var/ipfire/cups to the backup.

Signed-off-by: Daniel Weismueller <daniel.weismueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-11 15:54:40 +00:00
Michael Tremer
1b22a95ca8 core166: Ship u-boot for aarch64
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-10 10:46:13 +00:00
Arne Fitzenreiter
d814021aa5 u-boot: add OrangePi Zero Plus (Allwinner H5)
this u-boot should also work with NanoPi R1S H5

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-10 10:45:43 +00:00
Michael Tremer
aee009fe23 core166: Ship wget
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-10 10:44:50 +00:00
Michael Tremer
d435669f81 core166: Ship perl-CGI
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-10 10:42:51 +00:00
Michael Tremer
817d34ecc8 core166: Ship pango
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-10 10:42:26 +00:00
Adolf Belka
ec89353c7b pango: Update to version 1.50.4
- Update from 1.50.0 to 1.50.4
- Update of rootfile
- Changelog
   Overview of changes in 1.50.4, 09-02-2022
	* Tweak synthetic space sizes
	* itemize: Try harder to avoid NULL fonts
	* docs: Some additions
	* Pass synthetic slant to harfbuzz
	* Make sloped carets work with uneven scales
	* Fix serialiation on arm
	* Avoid an uninitialized variable warning
	* Reinstate previous behavior of pango_attr_list_splice
	* Deprecated pango_coverage_ref/unref
	* Fix serialization on non-glibc systems
	* Fix allow-breaks handling
   Overview of changes in 1.50.3, 21-12-2021
	* pango-view: Add --serialize-to option for easy bug reporting
	* Revert a transformation change that broke metrics for vertical text
	* Handle fonts without space glyph (such as icon fonts) better
	* Fix some corner cases of line width accounting
	* Fix line height with emulated Small Caps
   Overview of changes in 1.50.2, 16-12-2021
	* Fix a problem with font fallback for Arabic
	* Fix handling of fonts without a space glyph
	* Various documentation improvements
	* Fix build issues
   Overview of changes in 1.50.1, 10-12-2021
	* Fix a crash in tab handling
	* Fix tab positioning without line wrapping
	* Fix an assertion failure found by fuzzing
	* Make underlines work again for broken fonts

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-10 10:42:10 +00:00
Adolf Belka
6a221fadaa hplip: Update to version 3.22.2
- Update from 3.21.6 to 3.22.2
- Update of rootfile
- Changelog
   HPLIP 3.22.2 - This release has the following changes:
     Added support for following new Distro's:
	Elementary OS 6.1
	RHEL 8.5
	Linux Mint 20.3
     Added support for the following new Printers:
	HP LaserJet Tank MFP 1602a
	HP LaserJet Tank MFP 1602w
	HP LaserJet Tank MFP 1604w
	HP LaserJet Tank MFP 2602dn
	HP LaserJet Tank MFP 2602sdn
	HP LaserJet Tank MFP 2602sdw
	HP LaserJet Tank MFP 2602dw
	HP LaserJet Tank MFP 2604dw
	HP LaserJet Tank MFP 2604sdw
	HP LaserJet Tank MFP 2603dw
	HP LaserJet Tank MFP 2603sdw
	HP LaserJet Tank MFP 2605sdw
	HP LaserJet Tank MFP 2606dn
	HP LaserJet Tank MFP 2606sdn
	HP LaserJet Tank MFP 2606sdw
	HP LaserJet Tank MFP 2606dw
	HP LaserJet Tank MFP 2606dc
	HP LaserJet Tank MFP 1005
	HP LaserJet Tank MFP 1005w
	HP LaserJet Tank MFP 1005nw
	HP LaserJet Tank 1502a
	HP LaserJet Tank 1502w
	HP LaserJet Tank 1504w
	HP LaserJet Tank 2502dw
	HP LaserJet Tank 2502dn
	HP LaserJet Tank 2504dw
	HP LaserJet Tank 2503dw
	HP LaserJet Tank 2506dw
	HP LaserJet Tank 2506d
	HP LaserJet Tank 2506dn
	HP LaserJet Tank 1020
	HP LaserJet Tank 1020w
	HP LaserJet Tank 1020nw
   HPLIP 3.21.12- This release has the following changes:
     Added support for following new Distro's:
	MX Linux 21
	Elementary OS 6
	Fedora 35
   HPLIP 3.21.10 - This release has the following changes:
     Added support for following new Distro's:
	Ubuntu 21.10
	Debian 11
	Zorin 15
	Zorin 16
     Added support for the following new Printers:
	HP ENVY Inspire 7200e series
	HP ENVY Inspire 7900e series
	HP LaserJet MFP M140a
	HP LaserJet MFP M139a
	HP LaserJet MFP M141a
	HP LaserJet MFP M142a
	HP LaserJet MFP M140w
	HP LaserJet MFP M140we
	HP LaserJet MFP M139w
	HP LaserJet MFP M139we
	HP LaserJet MFP M141w
	HP LaserJet MFP M141we
	HP LaserJet MFP M142we
	HP LaserJet MFP M142w
	HP LaserJet M109a
	HP LaserJet M110a
	HP LaserJet M111a
	HP LaserJet M112a
	HP LaserJet M109w
	HP LaserJet M109we
	HP LaserJet M110w
	HP LaserJet M110we
	HP LaserJet M111w
	HP LaserJet M111we
	HP LaserJet M112we
	HP LaserJet M112w
	HP DesignJet Z6 Pro 64in
	HP DesignJet Z9 Pro 64in
	HP PageWide XL Pro 5200 PS MFP series
	HP PageWide XL Pro 8200 PS MFP series
	HP PageWide XL 3920 MFP
	HP PageWide XL 4200 Printer
	HP PageWide XL 4200 Multifunction Printer
	HP PageWide XL 4700 Printer
	HP PageWide XL 4700 Multifunction Printer
	HP PageWide XL 5200 Printer
	HP PageWide XL 5200 Multifunction Printer
	HP PageWide XL 8200 Printer
   HPLIP 3.21.8 - This release has the following changes:
     Added support for following new Distro's:
	Linux Mint 20.2
	RHEL 8.4
	Manjaro 21.0.7
     Added support for the following new Printers:
	HP Smart Tank 500 series
	HP Smart Tank 530 series
	HP Smart Tank Plus 570 series
	HP Smart Tank 7600
	HP Smart Tank 750
	HP Smart Tank 790
	HP Smart Tank Plus 710-720
	HP Smart Tank Plus 7000
	HP Smart Tank Plus 660-670
	HP Smart Tank Plus 6000
	HP DeskJet Ink Advantage Ultra 4800 All-in-One Printer series

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-03-10 10:41:57 +00:00