1
0
Fork 0
mirror of git://slackware.nl/current.git synced 2025-02-11 08:48:30 +01:00
slackware-current/source
Patrick J Volkerding 74eccb41fe Wed Feb 5 23:21:34 UTC 2025
a/hwdata-0.392-noarch-1.txz:  Upgraded.
a/tcsh-6.24.15-x86_64-1.txz:  Upgraded.
ap/mariadb-11.4.5-x86_64-1.txz:  Upgraded.
  This update fixes bugs and a security issue:
  Easily exploitable vulnerability allows high privileged attacker with network
  access via multiple protocols to compromise MySQL Server. Successful attacks
  of this vulnerability can result in unauthorized ability to cause a hang or
  frequently repeatable crash (complete DOS) of MySQL Server.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2025-21490
  (* Security fix *)
ap/rdfind-1.7.0-x86_64-1.txz:  Upgraded.
d/python3-3.12.9-x86_64-1.txz:  Upgraded.
kde/calligra-3.2.1-x86_64-49.txz:  Rebuilt.
  Recompiled against poppler-25.02.0.
kde/cantor-23.08.5-x86_64-16.txz:  Rebuilt.
  Recompiled against poppler-25.02.0.
kde/kfilemetadata-5.116.0-x86_64-12.txz:  Rebuilt.
  Recompiled against poppler-25.02.0.
kde/kile-2.9.93-x86_64-42.txz:  Rebuilt.
  Recompiled against poppler-25.02.0.
kde/kitinerary-23.08.5-x86_64-13.txz:  Rebuilt.
  Recompiled against poppler-25.02.0.
kde/krita-5.2.6-x86_64-7.txz:  Rebuilt.
  Recompiled against poppler-25.02.0.
kde/labplot-2.11.1-x86_64-8.txz:  Rebuilt.
  Recompiled against poppler-25.02.0.
kde/okular-23.08.5-x86_64-13.txz:  Rebuilt.
  Recompiled against poppler-25.02.0.
l/mozilla-nss-3.108-x86_64-1.txz:  Upgraded.
l/pcre2-10.45-x86_64-1.txz:  Upgraded.
l/poppler-25.02.0-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
n/curl-8.12.0-x86_64-1.txz:  Upgraded.
  This release fixes the following security issues:
  gzip integer overflow
  eventfd double close
  netrc and default credential leak
  For more information, see:
    https://curl.se/docs/CVE-2025-0725.html
    https://curl.se/docs/CVE-2025-0665.html
    https://curl.se/docs/CVE-2025-0167.html
    https://www.cve.org/CVERecord?id=CVE-2025-0725
    https://www.cve.org/CVERecord?id=CVE-2025-0665
    https://www.cve.org/CVERecord?id=CVE-2025-0167
  (* Security fix *)
xap/mozilla-thunderbird-128.7.0esr-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/thunderbird/128.7.0esr/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2025-10/
    https://www.cve.org/CVERecord?id=CVE-2025-1009
    https://www.cve.org/CVERecord?id=CVE-2025-1010
    https://www.cve.org/CVERecord?id=CVE-2025-1011
    https://www.cve.org/CVERecord?id=CVE-2025-1012
    https://www.cve.org/CVERecord?id=CVE-2025-1013
    https://www.cve.org/CVERecord?id=CVE-2025-1014
    https://www.cve.org/CVERecord?id=CVE-2025-1015
    https://www.cve.org/CVERecord?id=CVE-2025-1016
    https://www.cve.org/CVERecord?id=CVE-2025-1017
  (* Security fix *)
2025-02-06 01:56:37 +01:00
..
a Sat Feb 1 21:14:13 UTC 2025 2025-02-02 00:13:05 +01:00
ap Wed Feb 5 23:21:34 UTC 2025 2025-02-06 01:56:37 +01:00
d Sun Feb 2 22:32:33 UTC 2025 2025-02-03 00:43:47 +01:00
e Tue Jul 23 18:54:25 UTC 2024 2024-07-23 22:50:05 +02:00
f Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
installer Fri Dec 27 23:07:45 UTC 2024 2024-12-28 01:14:53 +01:00
k Sun Feb 2 22:32:33 UTC 2025 2025-02-03 00:43:47 +01:00
kde Wed Feb 5 23:21:34 UTC 2025 2025-02-06 01:56:37 +01:00
l Wed Feb 5 23:21:34 UTC 2025 2025-02-06 01:56:37 +01:00
n Sat Feb 1 21:14:13 UTC 2025 2025-02-02 00:13:05 +01:00
t Tue Dec 31 19:47:47 UTC 2024 2024-12-31 21:29:46 +01:00
tcl Thu Dec 5 22:00:02 UTC 2024 2024-12-05 23:45:17 +01:00
x Sat Feb 1 21:14:13 UTC 2025 2025-02-02 00:13:05 +01:00
xap Tue Feb 4 19:19:28 UTC 2025 2025-02-04 21:03:58 +01:00
xfce Mon Feb 3 20:57:45 UTC 2025 2025-02-03 22:36:20 +01:00
y Mon Dec 23 23:43:54 UTC 2024 2024-12-24 01:04:05 +01:00
buildlist-from-changelog.sh Fri Oct 8 03:23:28 UTC 2021 2021-10-08 08:59:45 +02:00
make_world.sh Wed Jun 8 19:15:34 UTC 2022 2022-06-09 07:00:13 +02:00
README.TXT Wed Feb 2 08:21:48 UTC 2022 2022-02-02 11:59:53 +01:00

This is the source used for Slackware.

To look for a particular bit of source (let's say for 'cp'), first you would
look for the full path:

fuzzy:~# which cp
/bin/cp

Then, you grep for the package it came from. Note that the leading '/'
is removed, and ^ and $ mark the beginning and end of the pattern to match:

fuzzy:~# grep ^bin/cp$ /var/lib/pkgtools/packages/*
/var/lib/pkgtools/packages/coreutils-9.0-x86_64-3:bin/cp

From this, you can see that 'cp' came from the coreutils-9.0-x86_64-3 package.
The source will be found in a corresponding subdirectory. In this case, that
would be ./a/coreutils/.

All of these packages have scripts that extract, patch, and compile the source
automatically. These are the 'SlackBuild' scripts.

Have fun!

---
Patrick J. Volkerding
volkerdi@slackware.com