mirror of
git://slackware.nl/current.git
synced 2025-02-11 08:48:30 +01:00
![]() a/hwdata-0.392-noarch-1.txz: Upgraded. a/tcsh-6.24.15-x86_64-1.txz: Upgraded. ap/mariadb-11.4.5-x86_64-1.txz: Upgraded. This update fixes bugs and a security issue: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. For more information, see: https://www.cve.org/CVERecord?id=CVE-2025-21490 (* Security fix *) ap/rdfind-1.7.0-x86_64-1.txz: Upgraded. d/python3-3.12.9-x86_64-1.txz: Upgraded. kde/calligra-3.2.1-x86_64-49.txz: Rebuilt. Recompiled against poppler-25.02.0. kde/cantor-23.08.5-x86_64-16.txz: Rebuilt. Recompiled against poppler-25.02.0. kde/kfilemetadata-5.116.0-x86_64-12.txz: Rebuilt. Recompiled against poppler-25.02.0. kde/kile-2.9.93-x86_64-42.txz: Rebuilt. Recompiled against poppler-25.02.0. kde/kitinerary-23.08.5-x86_64-13.txz: Rebuilt. Recompiled against poppler-25.02.0. kde/krita-5.2.6-x86_64-7.txz: Rebuilt. Recompiled against poppler-25.02.0. kde/labplot-2.11.1-x86_64-8.txz: Rebuilt. Recompiled against poppler-25.02.0. kde/okular-23.08.5-x86_64-13.txz: Rebuilt. Recompiled against poppler-25.02.0. l/mozilla-nss-3.108-x86_64-1.txz: Upgraded. l/pcre2-10.45-x86_64-1.txz: Upgraded. l/poppler-25.02.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. n/curl-8.12.0-x86_64-1.txz: Upgraded. This release fixes the following security issues: gzip integer overflow eventfd double close netrc and default credential leak For more information, see: https://curl.se/docs/CVE-2025-0725.html https://curl.se/docs/CVE-2025-0665.html https://curl.se/docs/CVE-2025-0167.html https://www.cve.org/CVERecord?id=CVE-2025-0725 https://www.cve.org/CVERecord?id=CVE-2025-0665 https://www.cve.org/CVERecord?id=CVE-2025-0167 (* Security fix *) xap/mozilla-thunderbird-128.7.0esr-x86_64-1.txz: Upgraded. This release contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/thunderbird/128.7.0esr/releasenotes/ https://www.mozilla.org/en-US/security/advisories/mfsa2025-10/ https://www.cve.org/CVERecord?id=CVE-2025-1009 https://www.cve.org/CVERecord?id=CVE-2025-1010 https://www.cve.org/CVERecord?id=CVE-2025-1011 https://www.cve.org/CVERecord?id=CVE-2025-1012 https://www.cve.org/CVERecord?id=CVE-2025-1013 https://www.cve.org/CVERecord?id=CVE-2025-1014 https://www.cve.org/CVERecord?id=CVE-2025-1015 https://www.cve.org/CVERecord?id=CVE-2025-1016 https://www.cve.org/CVERecord?id=CVE-2025-1017 (* Security fix *) |
||
---|---|---|
.. | ||
a | ||
ap | ||
d | ||
e | ||
f | ||
installer | ||
k | ||
kde | ||
l | ||
n | ||
t | ||
tcl | ||
x | ||
xap | ||
xfce | ||
y | ||
buildlist-from-changelog.sh | ||
make_world.sh | ||
README.TXT |
This is the source used for Slackware. To look for a particular bit of source (let's say for 'cp'), first you would look for the full path: fuzzy:~# which cp /bin/cp Then, you grep for the package it came from. Note that the leading '/' is removed, and ^ and $ mark the beginning and end of the pattern to match: fuzzy:~# grep ^bin/cp$ /var/lib/pkgtools/packages/* /var/lib/pkgtools/packages/coreutils-9.0-x86_64-3:bin/cp From this, you can see that 'cp' came from the coreutils-9.0-x86_64-3 package. The source will be found in a corresponding subdirectory. In this case, that would be ./a/coreutils/. All of these packages have scripts that extract, patch, and compile the source automatically. These are the 'SlackBuild' scripts. Have fun! --- Patrick J. Volkerding volkerdi@slackware.com