1
0
Fork 0
mirror of git://slackware.nl/current.git synced 2025-01-18 22:27:20 +01:00
slackware-current/source
Patrick J Volkerding 4967f0e2be Tue Oct 22 23:55:03 UTC 2024
a/elilo-3.16-x86_64-18.txz:  Rebuilt.
  eliloconfig: if we don't find initrd-generic.img, try to fall back on
  /boot/initrd.gz. Thanks to rworkman.
a/kernel-firmware-20241022_e1d9577-noarch-1.txz:  Upgraded.
a/kernel-generic-6.11.5-x86_64-1.txz:  Upgraded.
a/less-668-x86_64-1.txz:  Upgraded.
a/openssl11-solibs-1.1.1zb-x86_64-1.txz:  Upgraded.
a/sysvinit-3.11-x86_64-1.txz:  Upgraded.
a/usbutils-018-x86_64-1.txz:  Upgraded.
d/kernel-headers-6.11.5-x86-1.txz:  Upgraded.
d/parallel-20241022-noarch-1.txz:  Upgraded.
d/swig-4.3.0-x86_64-1.txz:  Upgraded.
k/kernel-source-6.11.5-noarch-1.txz:  Upgraded.
l/libvisio-0.1.8-x86_64-1.txz:  Upgraded.
l/python-trove-classifiers-2024.10.21.16-x86_64-1.txz:  Upgraded.
n/openssl11-1.1.1zb-x86_64-1.txz:  Upgraded.
  Apply patch to fix a security issue:
  Harden BN_GF2m_poly2arr against misuse.
  This CVE was fixed by the 1.1.1zb release that is only available to
  subscribers to OpenSSL's premium extended support. The patch was prepared
  by backporting from the OpenSSL-3.0 repo. The reported version number has
  been updated so that vulnerability scanners calm down.
  Thanks to Ken Zalewski for the patch!
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2024-9143
  (* Security fix *)
xap/gucharmap-16.0.2-x86_64-1.txz:  Upgraded.
xap/mozilla-thunderbird-128.3.3esr-x86_64-1.txz:  Upgraded.
  This is a bugfix release.
  For more information, see:
    https://www.mozilla.org/en-US/thunderbird/128.3.3esr/releasenotes/
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2024-10-23 03:12:37 +02:00
..
a Tue Oct 22 23:55:03 UTC 2024 2024-10-23 03:12:37 +02:00
ap Sat Oct 19 21:31:17 UTC 2024 2024-10-20 00:05:48 +02:00
d Tue Oct 22 23:55:03 UTC 2024 2024-10-23 03:12:37 +02:00
e Tue Jul 23 18:54:25 UTC 2024 2024-07-23 22:50:05 +02:00
f Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
installer Sat Oct 5 21:24:49 UTC 2024 2024-10-06 00:04:43 +02:00
k Tue Oct 22 23:55:03 UTC 2024 2024-10-23 03:12:37 +02:00
kde Fri Oct 18 22:51:09 UTC 2024 2024-10-19 01:29:44 +02:00
l Tue Oct 22 23:55:03 UTC 2024 2024-10-23 03:12:37 +02:00
n Tue Oct 22 23:55:03 UTC 2024 2024-10-23 03:12:37 +02:00
t Tue Apr 9 18:14:27 UTC 2024 2024-04-09 21:00:29 +02:00
tcl Tue Sep 17 23:29:04 UTC 2024 2024-09-18 02:05:31 +02:00
x Fri Oct 18 22:51:09 UTC 2024 2024-10-19 01:29:44 +02:00
xap Tue Oct 22 23:55:03 UTC 2024 2024-10-23 03:12:37 +02:00
xfce Mon Oct 21 19:11:58 UTC 2024 2024-10-21 21:30:18 +02:00
y Sun May 12 19:10:12 UTC 2024 2024-05-12 21:28:58 +02:00
buildlist-from-changelog.sh Fri Oct 8 03:23:28 UTC 2021 2021-10-08 08:59:45 +02:00
make_world.sh Wed Jun 8 19:15:34 UTC 2022 2022-06-09 07:00:13 +02:00
README.TXT Wed Feb 2 08:21:48 UTC 2022 2022-02-02 11:59:53 +01:00

This is the source used for Slackware.

To look for a particular bit of source (let's say for 'cp'), first you would
look for the full path:

fuzzy:~# which cp
/bin/cp

Then, you grep for the package it came from. Note that the leading '/'
is removed, and ^ and $ mark the beginning and end of the pattern to match:

fuzzy:~# grep ^bin/cp$ /var/lib/pkgtools/packages/*
/var/lib/pkgtools/packages/coreutils-9.0-x86_64-3:bin/cp

From this, you can see that 'cp' came from the coreutils-9.0-x86_64-3 package.
The source will be found in a corresponding subdirectory. In this case, that
would be ./a/coreutils/.

All of these packages have scripts that extract, patch, and compile the source
automatically. These are the 'SlackBuild' scripts.

Have fun!

---
Patrick J. Volkerding
volkerdi@slackware.com