slackware-current/source
Patrick J Volkerding 3136d6fa09 Tue Aug 31 20:58:13 UTC 2021
a/etc-15.0-x86_64-16.txz:  Rebuilt.
  Added dhcpcd:dhcpcd (68:68) user and group. Thanks to Paul Blazejowski.
a/kernel-firmware-20210830_2e271f2-noarch-1.txz:  Upgraded.
a/ntfs-3g-2021.8.22-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
  Fixed vulnerabilities that may allow an attacker using a maliciously
  crafted NTFS-formatted image file or external storage to potentially
  execute arbitrary privileged code.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33285
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35269
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35268
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33289
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33286
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35266
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33287
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35267
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39251
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39252
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39253
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39254
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39255
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39256
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39257
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39258
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39259
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39260
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39261
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39262
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39263
  (* Security fix *)
d/mercurial-5.9.1-x86_64-1.txz:  Upgraded.
d/python3-3.9.7-x86_64-1.txz:  Upgraded.
kde/bluedevil-5.22.5-x86_64-1.txz:  Upgraded.
kde/breeze-5.22.5-x86_64-1.txz:  Upgraded.
kde/breeze-grub-5.22.5-x86_64-1.txz:  Upgraded.
kde/breeze-gtk-5.22.5-x86_64-1.txz:  Upgraded.
kde/drkonqi-5.22.5-x86_64-1.txz:  Upgraded.
kde/kactivitymanagerd-5.22.5-x86_64-1.txz:  Upgraded.
kde/kde-cli-tools-5.22.5-x86_64-1.txz:  Upgraded.
kde/kde-gtk-config-5.22.5-x86_64-1.txz:  Upgraded.
kde/kdecoration-5.22.5-x86_64-1.txz:  Upgraded.
kde/kdeplasma-addons-5.22.5-x86_64-1.txz:  Upgraded.
kde/kgamma5-5.22.5-x86_64-1.txz:  Upgraded.
kde/khotkeys-5.22.5-x86_64-1.txz:  Upgraded.
kde/kinfocenter-5.22.5-x86_64-1.txz:  Upgraded.
kde/kmenuedit-5.22.5-x86_64-1.txz:  Upgraded.
kde/kscreen-5.22.5-x86_64-1.txz:  Upgraded.
kde/kscreenlocker-5.22.5-x86_64-1.txz:  Upgraded.
kde/ksshaskpass-5.22.5-x86_64-1.txz:  Upgraded.
kde/ksystemstats-5.22.5-x86_64-1.txz:  Upgraded.
kde/kwallet-pam-5.22.5-x86_64-1.txz:  Upgraded.
kde/kwayland-integration-5.22.5-x86_64-1.txz:  Upgraded.
kde/kwayland-server-5.22.5-x86_64-1.txz:  Upgraded.
kde/kwin-5.22.5-x86_64-1.txz:  Upgraded.
kde/kwrited-5.22.5-x86_64-1.txz:  Upgraded.
kde/layer-shell-qt-5.22.5-x86_64-1.txz:  Upgraded.
kde/libkscreen-5.22.5-x86_64-1.txz:  Upgraded.
kde/libksysguard-5.22.5-x86_64-1.txz:  Upgraded.
kde/milou-5.22.5-x86_64-1.txz:  Upgraded.
kde/oxygen-5.22.5-x86_64-1.txz:  Upgraded.
kde/plasma-browser-integration-5.22.5-x86_64-1.txz:  Upgraded.
kde/plasma-desktop-5.22.5-x86_64-1.txz:  Upgraded.
kde/plasma-disks-5.22.5-x86_64-1.txz:  Upgraded.
kde/plasma-firewall-5.22.5-x86_64-1.txz:  Upgraded.
kde/plasma-integration-5.22.5-x86_64-1.txz:  Upgraded.
kde/plasma-nm-5.22.5-x86_64-1.txz:  Upgraded.
kde/plasma-pa-5.22.5-x86_64-1.txz:  Upgraded.
kde/plasma-sdk-5.22.5-x86_64-1.txz:  Upgraded.
kde/plasma-systemmonitor-5.22.5-x86_64-1.txz:  Upgraded.
kde/plasma-vault-5.22.5-x86_64-1.txz:  Upgraded.
kde/plasma-workspace-5.22.5-x86_64-1.txz:  Upgraded.
kde/plasma-workspace-wallpapers-5.22.5-x86_64-1.txz:  Upgraded.
kde/polkit-kde-agent-1-5.22.5-x86_64-1.txz:  Upgraded.
kde/powerdevil-5.22.5-x86_64-1.txz:  Upgraded.
kde/qqc2-breeze-style-5.22.5-x86_64-1.txz:  Upgraded.
kde/sddm-kcm-5.22.5-x86_64-1.txz:  Upgraded.
kde/systemsettings-5.22.5-x86_64-1.txz:  Upgraded.
kde/xdg-desktop-portal-kde-5.22.5-x86_64-1.txz:  Upgraded.
l/mozilla-nss-3.69.1-x86_64-1.txz:  Upgraded.
xap/xlockmore-5.67-x86_64-1.txz:  Upgraded.
2021-09-01 08:59:56 +02:00
..
a Tue Aug 31 20:58:13 UTC 2021 2021-09-01 08:59:56 +02:00
ap Mon Aug 16 05:28:16 UTC 2021 2021-08-16 17:59:55 +02:00
d Sun Aug 29 18:23:50 UTC 2021 2021-08-30 08:59:55 +02:00
e
f
installer Wed May 26 20:00:32 UTC 2021 2021-05-27 08:59:55 +02:00
k Mon Aug 30 18:22:08 UTC 2021 2021-08-31 08:59:55 +02:00
kde Tue Aug 31 20:58:13 UTC 2021 2021-09-01 08:59:56 +02:00
l Tue Aug 31 20:58:13 UTC 2021 2021-09-01 08:59:56 +02:00
n Mon Aug 30 18:22:08 UTC 2021 2021-08-31 08:59:55 +02:00
t Tue Jul 6 20:44:20 UTC 2021 2021-07-07 08:59:52 +02:00
tcl
x Sun Aug 22 18:53:28 UTC 2021 2021-08-23 08:59:47 +02:00
xap Tue Aug 31 20:58:13 UTC 2021 2021-09-01 08:59:56 +02:00
xfce Tue Aug 3 06:55:27 UTC 2021 2021-08-03 18:00:00 +02:00
y
buildlist-from-changelog.sh
make_world.sh
README.TXT

This is the source used for Slackware.

To look for a particular bit of source (let's say for 'cp'), first you would
look for the full path:

fuzzy:~# which cp
/bin/cp

Then, you grep for the package it came from. Note that the leading '/'
is removed:

fuzzy:~# grep bin/cp /var/log/packages/*
/var/log/packages/cpio-2.4.2.91-i386-1:bin/cpio
/var/log/packages/fileutils-4.1-i386-2:bin/cp
/var/log/packages/gcc-2.95.3-i386-2:usr/bin/cpp
/var/log/packages/gnome-applets-1.4.0.5-i386-1:usr/bin/cpumemusage_applet


From this, you can see that 'cp' came from the fileutils-4.1-i386-2 package.
The source will be found in a corresponding subdirectory.  In this case, that
would be ./a/bin.   Don't be fooled into thinking that the _bin.tar.gz in this
directory is the package with the source code -- anything starting with '_' is
just a framework package full of empty files with the correct permissions and 
ownerships for the completed package to use.

Many of these packages now have scripts that untar, patch, and compile the
source automatically.  These are the 'SlackBuild' scripts.  Moving back to the
example above, you can figure out which package the bin/cp source came from by
examining the SlackBuild script.

Have fun!

---
Patrick J. Volkerding
volkerdi@slackware.com