slackware-current/source
Patrick J Volkerding 20f8c8e774 Wed Mar 30 22:37:05 UTC 2022
ap/vim-8.2.4649-x86_64-1.txz:  Upgraded.
  Fixes a use-after-free in utf_ptr2char in vim/vim prior to 8.2.4646.
  This vulnerability is capable of crashing software, bypassing protection
  mechanisms, modifying memory, and possibly execution of arbitrary code.
  Thanks to marav for the heads-up.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154
    https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425
    b55986c52d
  (* Security fix *)
d/cmake-3.23.0-x86_64-1.txz:  Upgraded.
d/meson-0.61.4-x86_64-1.txz:  Upgraded.
l/harfbuzz-4.2.0-x86_64-1.txz:  Upgraded.
l/libcap-ng-0.8.3-x86_64-1.txz:  Upgraded.
l/mlt-7.6.0-x86_64-1.txz:  Upgraded.
x/xdg-desktop-portal-1.14.2-x86_64-1.txz:  Upgraded.
xap/vim-gvim-8.2.4649-x86_64-1.txz:  Upgraded.
2022-03-31 06:59:46 +02:00
..
a Tue Mar 29 20:16:24 UTC 2022 2022-03-30 06:59:45 +02:00
ap Mon Mar 28 19:33:46 UTC 2022 2022-03-29 06:59:44 +02:00
d Mon Mar 14 01:55:37 UTC 2022 2022-03-14 06:59:44 +01:00
e Mon Feb 21 20:21:38 UTC 2022 2022-02-22 06:59:43 +01:00
f
installer Fri Feb 11 20:36:58 UTC 2022 2022-02-12 00:39:50 +01:00
k Mon Mar 28 19:33:46 UTC 2022 2022-03-29 06:59:44 +02:00
kde Mon Mar 14 01:55:37 UTC 2022 2022-03-14 06:59:44 +01:00
l Wed Mar 30 22:37:05 UTC 2022 2022-03-31 06:59:46 +02:00
n Mon Mar 28 19:33:46 UTC 2022 2022-03-29 06:59:44 +02:00
t Thu Feb 24 05:50:40 UTC 2022 2022-02-24 22:59:46 +01:00
tcl Thu Feb 10 01:46:55 UTC 2022 2022-02-10 08:07:49 +01:00
x Mon Mar 28 01:02:12 UTC 2022 2022-03-28 06:59:45 +02:00
xap Wed Mar 23 17:25:36 UTC 2022 2022-03-24 06:59:46 +01:00
xfce Sat Mar 12 20:57:35 UTC 2022 2022-03-13 06:59:45 +01:00
y Thu Feb 10 01:46:55 UTC 2022 2022-02-10 08:07:49 +01:00
buildlist-from-changelog.sh Fri Oct 8 03:23:28 UTC 2021 2021-10-08 08:59:45 +02:00
make_world.sh Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
README.TXT Wed Feb 2 08:21:48 UTC 2022 2022-02-02 11:59:53 +01:00

This is the source used for Slackware.

To look for a particular bit of source (let's say for 'cp'), first you would
look for the full path:

fuzzy:~# which cp
/bin/cp

Then, you grep for the package it came from. Note that the leading '/'
is removed, and ^ and $ mark the beginning and end of the pattern to match:

fuzzy:~# grep ^bin/cp$ /var/lib/pkgtools/packages/*
/var/lib/pkgtools/packages/coreutils-9.0-x86_64-3:bin/cp

From this, you can see that 'cp' came from the coreutils-9.0-x86_64-3 package.
The source will be found in a corresponding subdirectory. In this case, that
would be ./a/coreutils/.

All of these packages have scripts that extract, patch, and compile the source
automatically. These are the 'SlackBuild' scripts.

Have fun!

---
Patrick J. Volkerding
volkerdi@slackware.com