mirror of
git://slackware.nl/current.git
synced 2024-12-26 09:58:59 +01:00
69753b9a1d
ap/sudo-1.9.15-x86_64-1.txz: Upgraded. The sudoers plugin has been modified to make it more resilient to ROWHAMMER attacks on authentication and policy matching. The sudoers plugin now constructs the user time stamp file path name using the user-ID instead of the user name. This avoids a potential problem with user names that contain a path separator ('/') being interpreted as part of the path name. For more information, see: https://www.cve.org/CVERecord?id=CVE-2023-42465 https://www.cve.org/CVERecord?id=CVE-2023-42456 (* Security fix *) ap/vim-9.0.2092-x86_64-1.txz: Upgraded. l/libuv-1.47.0-x86_64-1.txz: Upgraded. l/xapian-core-1.4.24-x86_64-1.txz: Upgraded. n/bind-9.18.19-x86_64-2.txz: Rebuilt. Don't go automatically chowning files in /var/named, since some users may have special requirements. But in case anyone finds that behavior useful, you may set NAMED_CHOWN=YES in /etc/default/named to turn it back on. Unless anyone has a good objection to it, this change is considered pending for the next BIND upgrades in -stable. Thanks to Mig21. xap/vim-gvim-9.0.2092-x86_64-1.txz: Upgraded. |
||
---|---|---|
.. | ||
a | ||
ap | ||
d | ||
e | ||
f | ||
installer | ||
k | ||
kde | ||
l | ||
n | ||
t | ||
tcl | ||
x | ||
xap | ||
xfce | ||
y | ||
buildlist-from-changelog.sh | ||
make_world.sh | ||
README.TXT |
This is the source used for Slackware. To look for a particular bit of source (let's say for 'cp'), first you would look for the full path: fuzzy:~# which cp /bin/cp Then, you grep for the package it came from. Note that the leading '/' is removed, and ^ and $ mark the beginning and end of the pattern to match: fuzzy:~# grep ^bin/cp$ /var/lib/pkgtools/packages/* /var/lib/pkgtools/packages/coreutils-9.0-x86_64-3:bin/cp From this, you can see that 'cp' came from the coreutils-9.0-x86_64-3 package. The source will be found in a corresponding subdirectory. In this case, that would be ./a/coreutils/. All of these packages have scripts that extract, patch, and compile the source automatically. These are the 'SlackBuild' scripts. Have fun! --- Patrick J. Volkerding volkerdi@slackware.com