slackware-current/source
Patrick J Volkerding 55547848f4 Mon Jul 24 22:07:56 UTC 2023
a/kernel-firmware-20230724_59fbffa-noarch-1.txz:  Upgraded.
  AMD microcode updated to fix a use-after-free in AMD Zen2 processors.
  From Tavis Ormandy's annoucement of the issue:
    "The practical result here is that you can spy on the registers of other
    processes. No system calls or privileges are required.
    It works across virtual machines and affects all operating systems.
    I have written a poc for this issue that's fast enough to reconstruct
    keys and passwords as users log in."
  For more information, see:
    https://seclists.org/oss-sec/2023/q3/59
    https://www.cve.org/CVERecord?id=CVE-2023-20593
  (* Security fix *)
a/kernel-generic-6.1.41-x86_64-1.txz:  Upgraded.
a/kernel-huge-6.1.41-x86_64-1.txz:  Upgraded.
a/kernel-modules-6.1.41-x86_64-1.txz:  Upgraded.
d/kernel-headers-6.1.41-x86-1.txz:  Upgraded.
k/kernel-source-6.1.41-noarch-1.txz:  Upgraded.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2023-07-25 01:06:05 +02:00
..
a Tue Jul 18 19:58:10 UTC 2023 2023-07-18 22:30:10 +02:00
ap Mon Jul 24 19:26:18 UTC 2023 2023-07-24 21:58:57 +02:00
d Wed Jul 19 20:36:46 UTC 2023 2023-07-19 23:51:30 +02:00
e Thu Dec 8 22:48:34 UTC 2022 2022-12-09 00:41:09 +01:00
f Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
installer Sun Jul 9 18:35:37 UTC 2023 2023-07-09 20:58:07 +02:00
k Mon Jul 24 22:07:56 UTC 2023 2023-07-25 01:06:05 +02:00
kde Sun Jul 16 20:35:56 UTC 2023 2023-07-16 23:28:51 +02:00
l Mon Jul 24 19:26:18 UTC 2023 2023-07-24 21:58:57 +02:00
n Mon Jul 24 19:26:18 UTC 2023 2023-07-24 21:58:57 +02:00
t Fri Jun 16 19:12:06 UTC 2023 2023-06-16 22:44:46 +02:00
tcl Fri May 5 22:49:16 UTC 2023 2023-05-06 01:34:25 +02:00
x Mon Jul 24 00:17:18 UTC 2023 2023-07-24 04:33:52 +02:00
xap Thu Jul 20 19:55:25 UTC 2023 2023-07-20 22:31:39 +02:00
xfce Tue Jun 6 20:26:59 UTC 2023 2023-06-07 00:59:33 +02:00
y Wed Mar 8 20:26:54 UTC 2023 2023-03-08 22:40:50 +01:00
buildlist-from-changelog.sh Fri Oct 8 03:23:28 UTC 2021 2021-10-08 08:59:45 +02:00
make_world.sh Wed Jun 8 19:15:34 UTC 2022 2022-06-09 07:00:13 +02:00
README.TXT Wed Feb 2 08:21:48 UTC 2022 2022-02-02 11:59:53 +01:00

This is the source used for Slackware.

To look for a particular bit of source (let's say for 'cp'), first you would
look for the full path:

fuzzy:~# which cp
/bin/cp

Then, you grep for the package it came from. Note that the leading '/'
is removed, and ^ and $ mark the beginning and end of the pattern to match:

fuzzy:~# grep ^bin/cp$ /var/lib/pkgtools/packages/*
/var/lib/pkgtools/packages/coreutils-9.0-x86_64-3:bin/cp

From this, you can see that 'cp' came from the coreutils-9.0-x86_64-3 package.
The source will be found in a corresponding subdirectory. In this case, that
would be ./a/coreutils/.

All of these packages have scripts that extract, patch, and compile the source
automatically. These are the 'SlackBuild' scripts.

Have fun!

---
Patrick J. Volkerding
volkerdi@slackware.com