1
0
Fork 0
mirror of git://slackware.nl/current.git synced 2025-01-27 07:59:56 +01:00
slackware-current/source
Patrick J Volkerding 4e955dc4b6 Fri Jan 31 20:46:25 UTC 2020
a/util-linux-2.35.1-x86_64-1.txz:  Upgraded.
a/zerofree-1.1.1-x86_64-1.txz:  Added.
  Also queued up for the next installer build. Thanks to bifferos.
ap/sudo-1.8.31-x86_64-1.txz:  Upgraded.
  This update fixes a security issue:
  In Sudo before 1.8.31, if pwfeedback is enabled in /etc/sudoers, users can
  trigger a stack-based buffer overflow in the privileged sudo process.
  (pwfeedback is a default setting in some Linux distributions; however, it
  is not the default for upstream or in Slackware, and would exist only if
  enabled by an administrator.) The attacker needs to deliver a long string
  to the stdin of getln() in tgetpass.c.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18634
  (* Security fix *)
n/NetworkManager-1.22.6-x86_64-1.txz:  Upgraded.
n/openldap-client-2.4.49-x86_64-1.txz:  Upgraded.
xfce/Thunar-1.8.11-x86_64-1.txz:  Removed.
xfce/thunar-1.8.12-x86_64-1.txz:  Added.
  Changed package name from "Thunar" to "thunar" to follow upstream's naming.
2020-02-01 08:59:50 +01:00
..
a Fri Jan 31 20:46:25 UTC 2020 2020-02-01 08:59:50 +01:00
ap Fri Jan 31 20:46:25 UTC 2020 2020-02-01 08:59:50 +01:00
d Fri Jan 31 03:36:03 UTC 2020 2020-01-31 08:59:47 +01:00
e Mon Nov 25 19:17:07 UTC 2019 2019-11-26 17:59:50 +01:00
f Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
installer Fri Jan 31 20:46:25 UTC 2020 2020-02-01 08:59:50 +01:00
k Thu Jan 30 04:59:13 UTC 2020 2020-01-30 08:59:48 +01:00
kde Tue Dec 31 05:17:04 UTC 2019 2019-12-31 14:59:51 +01:00
kdei Mon Sep 30 21:08:32 UTC 2019 2019-10-01 08:59:50 +02:00
l Mon Jan 27 00:48:51 UTC 2020 2020-01-27 08:59:48 +01:00
n Fri Jan 31 20:46:25 UTC 2020 2020-02-01 08:59:50 +01:00
t Mon Oct 7 04:41:29 UTC 2019 2019-10-07 17:59:47 +02:00
tcl Fri Nov 22 22:09:33 UTC 2019 2019-11-23 08:59:50 +01:00
x Fri Jan 31 03:36:03 UTC 2020 2020-01-31 08:59:47 +01:00
xap Fri Jan 24 22:59:00 UTC 2020 2020-01-25 08:59:48 +01:00
xfce Fri Jan 31 20:46:25 UTC 2020 2020-02-01 08:59:50 +01:00
y Sun Feb 17 23:44:53 UTC 2019 2019-02-18 08:59:47 +01:00
buildlist-from-changelog.sh Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
make_world.sh Thu Nov 22 05:56:56 UTC 2018 2018-11-22 17:59:46 +01:00
README.TXT Slackware 14.0 2018-05-31 22:51:55 +02:00

This is the source used for Slackware.

To look for a particular bit of source (let's say for 'cp'), first you would
look for the full path:

fuzzy:~# which cp
/bin/cp

Then, you grep for the package it came from. Note that the leading '/'
is removed:

fuzzy:~# grep bin/cp /var/log/packages/*
/var/log/packages/cpio-2.4.2.91-i386-1:bin/cpio
/var/log/packages/fileutils-4.1-i386-2:bin/cp
/var/log/packages/gcc-2.95.3-i386-2:usr/bin/cpp
/var/log/packages/gnome-applets-1.4.0.5-i386-1:usr/bin/cpumemusage_applet


From this, you can see that 'cp' came from the fileutils-4.1-i386-2 package.
The source will be found in a corresponding subdirectory.  In this case, that
would be ./a/bin.   Don't be fooled into thinking that the _bin.tar.gz in this
directory is the package with the source code -- anything starting with '_' is
just a framework package full of empty files with the correct permissions and 
ownerships for the completed package to use.

Many of these packages now have scripts that untar, patch, and compile the
source automatically.  These are the 'SlackBuild' scripts.  Moving back to the
example above, you can figure out which package the bin/cp source came from by
examining the SlackBuild script.

Have fun!

---
Patrick J. Volkerding
volkerdi@slackware.com