1
0
Fork 0
mirror of git://slackware.nl/current.git synced 2025-01-17 18:12:36 +01:00
slackware-current/source
Patrick J Volkerding 59f80800c2 Tue Apr 11 18:49:02 UTC 2023
a/mcelog-194-x86_64-1.txz:  Upgraded.
a/tcsh-6.24.08-x86_64-1.txz:  Upgraded.
d/meson-1.1.0-x86_64-1.txz:  Upgraded.
d/rust-bindgen-0.65.0-x86_64-1.txz:  Upgraded.
l/mozjs102-102.10.0esr-x86_64-1.txz:  Upgraded.
l/nodejs-19.9.0-x86_64-1.txz:  Upgraded.
l/parted-3.6-x86_64-1.txz:  Upgraded.
x/ibus-table-1.17.0-x86_64-1.txz:  Upgraded.
x/libXfixes-6.0.1-x86_64-1.txz:  Upgraded.
x/libXt-1.3.0-x86_64-1.txz:  Upgraded.
x/xf86-video-neomagic-1.3.1-x86_64-1.txz:  Added.
x/xf86-video-savage-2.4.0-x86_64-1.txz:  Added.
x/xwininfo-1.1.6-x86_64-1.txz:  Upgraded.
xap/mozilla-firefox-112.0-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/firefox/112.0/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2023-13
    https://www.mozilla.org/en-US/security/advisories/mfsa2023-13/#MFSA-TMP-2023-0001
    https://www.cve.org/CVERecord?id=CVE-2023-29531
    https://www.cve.org/CVERecord?id=CVE-2023-29532
    https://www.cve.org/CVERecord?id=CVE-2023-29533
    https://www.cve.org/CVERecord?id=CVE-2023-29534
    https://www.cve.org/CVERecord?id=CVE-2023-29535
    https://www.cve.org/CVERecord?id=CVE-2023-29536
    https://www.cve.org/CVERecord?id=CVE-2023-29537
    https://www.cve.org/CVERecord?id=CVE-2023-29538
    https://www.cve.org/CVERecord?id=CVE-2023-29539
    https://www.cve.org/CVERecord?id=CVE-2023-29540
    https://www.cve.org/CVERecord?id=CVE-2023-29541
    https://www.cve.org/CVERecord?id=CVE-2023-29542
    https://www.cve.org/CVERecord?id=CVE-2023-29543
    https://www.cve.org/CVERecord?id=CVE-2023-29544
    https://www.cve.org/CVERecord?id=CVE-2023-29545
    https://www.cve.org/CVERecord?id=CVE-2023-29546
    https://www.cve.org/CVERecord?id=CVE-2023-29547
    https://www.cve.org/CVERecord?id=CVE-2023-29548
    https://www.cve.org/CVERecord?id=CVE-2023-29549
    https://www.cve.org/CVERecord?id=CVE-2023-29550
    https://www.cve.org/CVERecord?id=CVE-2023-29551
  (* Security fix *)
2023-04-11 21:38:02 +02:00
..
a Fri Mar 31 18:01:09 UTC 2023 2023-03-31 21:43:36 +02:00
ap Mon Mar 20 18:26:23 UTC 2023 2023-03-20 21:32:56 +01:00
d Tue Apr 11 18:49:02 UTC 2023 2023-04-11 21:38:02 +02:00
e Thu Dec 8 22:48:34 UTC 2022 2022-12-09 00:41:09 +01:00
f Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
installer Fri Apr 7 00:51:44 UTC 2023 2023-04-07 03:45:57 +02:00
k Fri Apr 7 00:51:44 UTC 2023 2023-04-07 03:45:57 +02:00
kde Sat Apr 8 19:01:35 UTC 2023 2023-04-08 21:35:38 +02:00
l Fri Apr 7 00:51:44 UTC 2023 2023-04-07 03:45:57 +02:00
n Sat Apr 8 19:01:35 UTC 2023 2023-04-08 21:35:38 +02:00
t Wed Mar 22 20:22:25 UTC 2023 2023-03-22 22:37:07 +01:00
tcl Wed Nov 23 19:51:17 UTC 2022 2022-11-24 07:00:17 +01:00
x Tue Apr 11 18:49:02 UTC 2023 2023-04-11 21:38:02 +02:00
xap Wed Mar 8 20:26:54 UTC 2023 2023-03-08 22:40:50 +01:00
xfce Tue Mar 21 21:18:59 UTC 2023 2023-03-21 23:41:13 +01:00
y Wed Mar 8 20:26:54 UTC 2023 2023-03-08 22:40:50 +01:00
buildlist-from-changelog.sh Fri Oct 8 03:23:28 UTC 2021 2021-10-08 08:59:45 +02:00
make_world.sh Wed Jun 8 19:15:34 UTC 2022 2022-06-09 07:00:13 +02:00
README.TXT Wed Feb 2 08:21:48 UTC 2022 2022-02-02 11:59:53 +01:00

This is the source used for Slackware.

To look for a particular bit of source (let's say for 'cp'), first you would
look for the full path:

fuzzy:~# which cp
/bin/cp

Then, you grep for the package it came from. Note that the leading '/'
is removed, and ^ and $ mark the beginning and end of the pattern to match:

fuzzy:~# grep ^bin/cp$ /var/lib/pkgtools/packages/*
/var/lib/pkgtools/packages/coreutils-9.0-x86_64-3:bin/cp

From this, you can see that 'cp' came from the coreutils-9.0-x86_64-3 package.
The source will be found in a corresponding subdirectory. In this case, that
would be ./a/coreutils/.

All of these packages have scripts that extract, patch, and compile the source
automatically. These are the 'SlackBuild' scripts.

Have fun!

---
Patrick J. Volkerding
volkerdi@slackware.com