slackware-current/source
Patrick J Volkerding 01d68a3996 Thu Nov 17 01:49:28 UTC 2022
ap/man-db-2.11.1-x86_64-1.txz:  Upgraded.
ap/nano-7.0-x86_64-1.txz:  Upgraded.
ap/sqlite-3.40.0-x86_64-1.txz:  Upgraded.
kde/plasma-framework-5.100.0-x86_64-2.txz:  Rebuilt.
  [PATCH] svgitem: do not upscale svg when using fractional scaling.
l/netpbm-11.00.02-x86_64-1.txz:  Upgraded.
n/bind-9.18.9-x86_64-1.txz:  Upgraded.
n/krb5-1.20.1-x86_64-1.txz:  Upgraded.
  Fixed integer overflows in PAC parsing.
  Fixed null deref in KDC when decoding invalid NDR.
  Fixed memory leak in OTP kdcpreauth module.
  Fixed PKCS11 module path search.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2022-42898
  (* Security fix *)
n/samba-4.17.3-x86_64-1.txz:  Upgraded.
  Fixed a security issue where Samba's Kerberos libraries and AD DC failed
  to guard against integer overflows when parsing a PAC on a 32-bit system,
  which allowed an attacker with a forged PAC to corrupt the heap.
  For more information, see:
    https://www.samba.org/samba/security/CVE-2022-42898.html
    https://www.cve.org/CVERecord?id=CVE-2022-42898
  (* Security fix *)
x/libXft-2.3.7-x86_64-1.txz:  Upgraded.
x/wayland-protocols-1.29-noarch-1.txz:  Upgraded.
xap/mozilla-firefox-107.0-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/firefox/107.0/releasenotes/
    https://www.mozilla.org/security/advisories/mfsa2022-47/
    https://www.cve.org/CVERecord?id=CVE-2022-45403
    https://www.cve.org/CVERecord?id=CVE-2022-45404
    https://www.cve.org/CVERecord?id=CVE-2022-45405
    https://www.cve.org/CVERecord?id=CVE-2022-45406
    https://www.cve.org/CVERecord?id=CVE-2022-45407
    https://www.cve.org/CVERecord?id=CVE-2022-45408
    https://www.cve.org/CVERecord?id=CVE-2022-45409
    https://www.cve.org/CVERecord?id=CVE-2022-45410
    https://www.cve.org/CVERecord?id=CVE-2022-45411
    https://www.cve.org/CVERecord?id=CVE-2022-45412
    https://www.cve.org/CVERecord?id=CVE-2022-45413
    https://www.cve.org/CVERecord?id=CVE-2022-40674
    https://www.cve.org/CVERecord?id=CVE-2022-45415
    https://www.cve.org/CVERecord?id=CVE-2022-45416
    https://www.cve.org/CVERecord?id=CVE-2022-45417
    https://www.cve.org/CVERecord?id=CVE-2022-45418
    https://www.cve.org/CVERecord?id=CVE-2022-45419
    https://www.cve.org/CVERecord?id=CVE-2022-45420
    https://www.cve.org/CVERecord?id=CVE-2022-45421
  (* Security fix *)
xap/mozilla-thunderbird-102.5.0-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/thunderbird/102.5.0/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2022-49/
    https://www.cve.org/CVERecord?id=CVE-2022-45403
    https://www.cve.org/CVERecord?id=CVE-2022-45404
    https://www.cve.org/CVERecord?id=CVE-2022-45405
    https://www.cve.org/CVERecord?id=CVE-2022-45406
    https://www.cve.org/CVERecord?id=CVE-2022-45408
    https://www.cve.org/CVERecord?id=CVE-2022-45409
    https://www.cve.org/CVERecord?id=CVE-2022-45410
    https://www.cve.org/CVERecord?id=CVE-2022-45411
    https://www.cve.org/CVERecord?id=CVE-2022-45412
    https://www.cve.org/CVERecord?id=CVE-2022-45416
    https://www.cve.org/CVERecord?id=CVE-2022-45418
    https://www.cve.org/CVERecord?id=CVE-2022-45420
    https://www.cve.org/CVERecord?id=CVE-2022-45421
  (* Security fix *)
xfce/xfce4-settings-4.16.5-x86_64-1.txz:  Upgraded.
  This update fixes regressions in the previous security fix:
  mime-settings: Properly quote command parameters.
  Revert "Escape characters which do not belong into an URI/URL (Issue #390)."
2022-11-17 07:00:14 +01:00
..
a Tue Nov 8 22:21:43 UTC 2022 2022-11-09 07:00:18 +01:00
ap Thu Nov 17 01:49:28 UTC 2022 2022-11-17 07:00:14 +01:00
d Tue Nov 15 01:28:38 UTC 2022 2022-11-15 07:00:12 +01:00
e Tue Sep 6 20:21:24 UTC 2022 2022-09-07 07:00:17 +02:00
f
installer Fri Oct 14 01:39:37 UTC 2022 2022-10-14 09:00:17 +02:00
k Mon Oct 24 18:57:53 UTC 2022 2022-10-25 07:00:17 +02:00
kde Thu Nov 17 01:49:28 UTC 2022 2022-11-17 07:00:14 +01:00
l Tue Nov 15 01:28:38 UTC 2022 2022-11-15 07:00:12 +01:00
n Thu Nov 17 01:49:28 UTC 2022 2022-11-17 07:00:14 +01:00
t Thu Oct 27 02:30:15 UTC 2022 2022-10-27 09:00:17 +02:00
tcl
x Tue Nov 15 01:28:38 UTC 2022 2022-11-15 07:00:12 +01:00
xap Fri Nov 4 19:29:28 UTC 2022 2022-11-05 07:00:18 +01:00
xfce Thu Nov 17 01:49:28 UTC 2022 2022-11-17 07:00:14 +01:00
y Tue Sep 6 20:21:24 UTC 2022 2022-09-07 07:00:17 +02:00
buildlist-from-changelog.sh
make_world.sh
README.TXT

This is the source used for Slackware.

To look for a particular bit of source (let's say for 'cp'), first you would
look for the full path:

fuzzy:~# which cp
/bin/cp

Then, you grep for the package it came from. Note that the leading '/'
is removed, and ^ and $ mark the beginning and end of the pattern to match:

fuzzy:~# grep ^bin/cp$ /var/lib/pkgtools/packages/*
/var/lib/pkgtools/packages/coreutils-9.0-x86_64-3:bin/cp

From this, you can see that 'cp' came from the coreutils-9.0-x86_64-3 package.
The source will be found in a corresponding subdirectory. In this case, that
would be ./a/coreutils/.

All of these packages have scripts that extract, patch, and compile the source
automatically. These are the 'SlackBuild' scripts.

Have fun!

---
Patrick J. Volkerding
volkerdi@slackware.com