- Update from version 3.22.4 to 3.22.6
- Update of rootfile
- Changelog
HPLIP 3.22.6 - This release has the following changes:
Added support for following new Distro's:
Mx Linux 21.1
Ubuntu 22.04
Fedora 36
Added support for the following new Printers:
HP Color LaserJet Managed MFP E785dn
HP Color LaserJet Managed MFP E78523dn
HP Color LaserJet Managed MFP E78528dn
HP Color LaserJet Managed MFP E786dn
HP Color LaserJet Managed MFP E786 Core Printer
HP Color LaserJet Managed MFP E78625dn
HP Color LaserJet Managed FlowMFP E786z
HP Color LaserJet Managed Flow MFP E78625z
HP Color LaserJet Managed MFP E78630dn
HP Color LaserJet Managed Flow MFP E78630z
HP Color LaserJet Managed MFP E78635dn
HP Color LaserJet Managed Flow MFP E78635z
HP LaserJet Managed MFP E731dn
HP LaserJet Managed MFP E731 Core Printer
HP LaserJet Managed MFP E73130dn
HP LaserJet Managed Flow MFP E731z
HP LaserJet Managed Flow MFP E73130z
HP LaserJet Managed MFP E73135dn
HP LaserJet Managed Flow MFP E73135z
HP LaserJet Managed MFP E73140dn
HP LaserJet Managed Flow MFP E73140z
HP Color LaserJet Managed MFP E877dn
HP Color LaserJet Managed MFP E877 Core Printer
HP Color LaserJet Managed MFP E87740dn
HP Color LaserJet Managed Flow MFP E877z
HP Color LaserJet Managed Flow MFP E87740z
HP Color LaserJet Managed MFP E87750dn
HP Color LaserJet Managed Flow MFP E87750z
HP Color LaserJet Managed MFP E87760dn
HP Color LaserJet Managed Flow MFP E87760z
HP Color LaserJet Managed MFP E87770dn
HP Color LaserJet Managed Flow MFP E87770z
HP LaserJet Managed MFP E826dn
HP LaserJet Managed MFP E826 Core Printer
HP LaserJet Managed MFP E82650dn
HP LaserJet Managed Flow MFP E826z
HP LaserJet Managed Flow MFP E82650z
HP LaserJet Managed MFP E82660dn
HP LaserJet Managed Flow MFP E82660z
HP LaserJet Managed MFP E82670dn
HP LaserJet Managed Flow MFP E82670z
HP LaserJet Managed MFP E730dn
HP LaserJet Managed MFP E73025dn
HP LaserJet Managed MFP E73030dn
HP LaserJet Pro MFP 3101fdwe
HP LaserJet Pro MFP 3101fdw
HP LaserJet Pro MFP 3102fdwe
HP LaserJet Pro MFP 3102fdw
HP LaserJet Pro MFP 3103fdw
HP LaserJet Pro MFP 3104fdw
HP LaserJet Pro MFP 3101fdne
HP LaserJet Pro MFP 3101fdn
HP LaserJet Pro MFP 3102fdne
HP LaserJet Pro MFP 3102fdn
HP LaserJet Pro MFP 3103fdn
HP LaserJet Pro MFP 3104fdn
HP LaserJet Pro 3001dwe
HP LaserJet Pro 3001dw
HP LaserJet Pro 3002dwe
HP LaserJet Pro 3002dw
HP LaserJet Pro 3003dw
HP LaserJet Pro 3004dw
HP LaserJet Pro 3001dne
HP LaserJet Pro 3001dn
HP LaserJet Pro 3002dne
HP LaserJet Pro 3002dn
HP LaserJet Pro 3003dn
HP LaserJet Pro 3004dn
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
- libfmt required in run time by mpd
- mpd changelog specifically said fmt was a build only dependency
- Bug#12909 flagged up that fmt was also a run time dependency for mpd
Fixes: Bug#12909
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
Sodium is a new, easy-to-use software library for encryption,
decryption, signatures, password hashing and more.
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
- v3 version adds specific armv6l based rootfile as xxxMACHINExxx does not get correct
substitution
Fixes: Bug#12611
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
- starting tftpd currently throws "missing directory" error
- this change corrects the issue
Signed-off-by: Jon Murphy <jon.murphy@ipfire.org>
Acked-by: Stefan Schantl <stefan.schantl@ipfire.org>
- rootfile has all entries commented out as not needed for execution only build
Fixes: Bug#12611
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
To quote from the kernel documentation:
> If you say Y here, the layouts of structures that are entirely
> function pointers (and have not been manually annotated with
> __no_randomize_layout), or structures that have been explicitly
> marked with __randomize_layout, will be randomized at compile-time.
> This can introduce the requirement of an additional information
> exposure vulnerability for exploits targeting these structure
> types.
>
> Enabling this feature will introduce some performance impact,
> slightly increase memory usage, and prevent the use of forensic
> tools like Volatility against the system (unless the kernel
> source tree isn't cleaned after kernel installation).
>
> The seed used for compilation is located at
> scripts/gcc-plgins/randomize_layout_seed.h. It remains after
> a make clean to allow for external modules to be compiled with
> the existing seed and will be removed by a make mrproper or
> make distclean.
>
> Note that the implementation requires gcc 4.7 or newer.
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Acked-by: Michael Tremer <michael.tremer@ipfire.org>
For details see:
https://nlnetlabs.nl/projects/unbound/download/#unbound-1-16-2
"Features
Merge #718: Introduce infra-cache-max-rtt option to config max retransmit timeout.
Bug Fixes
Fix the novel ghost domain issues CVE-2022-30698 and CVE-2022-30699.
Fix bug introduced in 'improve val_sigcrypt.c::algo_needs_missing
for one loop pass'.
Merge PR #668 from Cristian Rodríguez: Set IP_BIND_ADDRESS_NO_PORT
on outbound tcp sockets.
Fix verbose EDE error printout.
Fix dname count in sldns parse type descriptor for SVCB and HTTPS.
For windows crosscompile, fix setting the IPV6_MTU socket option
equivalent (IPV6_USER_MTU); allows cross compiling with latest cross-compiler versions.
Merge PR 714: Avoid treat normal hosts as unresponsive servers. And fixup the lock code.
iana portlist update.
Update documentation for 'outbound-msg-retry:'.
Tests for ghost domain fixes."
Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
Quoted from https://capsule8.com/blog/kernel-configuration-glossary/:
> Significance: Critical
>
> In support of Kernel Address Space Layout Randomization (KASLR) this randomizes
> the physical address at which the kernel image is decompressed and the virtual
> address where the kernel image is mapped as a security feature that deters
> exploit attempts relying on knowledge of the location of kernel code internals.
We tried to enable this back in 2020, and failed. Since then, things
may have been improved, so let's give this low-hanging fruit another
try.
Fixes: #12363
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>