slackware-current/source
Patrick J Volkerding 767006b5b5 Fri Oct 18 22:51:09 UTC 2024
a/elilo-3.16-x86_64-17.txz:  Rebuilt.
  eliloconfig: adapt to new naming and lack of huge kernel. Thanks to gildbg.
ap/cups-browsed-2.1.0-x86_64-1.txz:  Upgraded.
  Removed support for legacy CUPS browsing and for LDAP
  Legacy CUPS browsing is not needed any more and, our implementation
  accepting any UDP packet on port 631, causes vulnerabilities, and
  our LDAP support is does not comly with RFC 7612 and is therefore
  limited. Fixes CVE-2024-47176 and CVE-2024-47850
  Default `BrowseRemoteProtocols` should not include `cups` protocol
  Works around CVE-2024-47176, the fix is the complete removal of
  legacy CUPS Browsing functionality.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2024-47176
    https://www.cve.org/CVERecord?id=CVE-2024-47850
  (* Security fix *)
l/dav1d-1.5.0-x86_64-1.txz:  Upgraded.
l/gvfs-1.56.1-x86_64-1.txz:  Upgraded.
l/libcupsfilters-2.1.0-x86_64-1.txz:  Upgraded.
  `cfGetPrinterAttributes5()`: Validate response attributes before return
  The IPP print destination which we are querying can be corrupted or
  forged, so validate the response to strenghten security. Fixes
  CVE-2024-47076.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2024-47076
  (* Security fix *)
l/libppd-2.1.0-x86_64-1.txz:  Upgraded.
  Prevent PPD generation based on invalid IPP response
  Overtaken from CUPS 2.x: Validate IPP attributes in PPD generator,
  refactor make-and-model code, PPDize preset and template names,
  quote PPD localized strings. Fixes CVE-2024-47175.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2024-47175
  (* Security fix *)
l/python-MarkupSafe-3.0.2-x86_64-1.txz:  Upgraded.
l/python-psutil-6.1.0-x86_64-1.txz:  Upgraded.
x/fcitx5-qt-5.1.8-x86_64-1.txz:  Upgraded.
2024-10-19 01:29:44 +02:00
..
a Fri Oct 18 22:51:09 UTC 2024 2024-10-19 01:29:44 +02:00
ap Fri Oct 18 22:51:09 UTC 2024 2024-10-19 01:29:44 +02:00
d Thu Oct 17 23:18:46 UTC 2024 2024-10-18 02:31:04 +02:00
e Tue Jul 23 18:54:25 UTC 2024 2024-07-23 22:50:05 +02:00
f Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
installer Sat Oct 5 21:24:49 UTC 2024 2024-10-06 00:04:43 +02:00
k Thu Oct 17 23:18:46 UTC 2024 2024-10-18 02:31:04 +02:00
kde Fri Oct 18 22:51:09 UTC 2024 2024-10-19 01:29:44 +02:00
l Fri Oct 18 22:51:09 UTC 2024 2024-10-19 01:29:44 +02:00
n Mon Oct 14 21:21:47 UTC 2024 2024-10-15 00:05:20 +02:00
t Tue Apr 9 18:14:27 UTC 2024 2024-04-09 21:00:29 +02:00
tcl Tue Sep 17 23:29:04 UTC 2024 2024-09-18 02:05:31 +02:00
x Fri Oct 18 22:51:09 UTC 2024 2024-10-19 01:29:44 +02:00
xap Thu Oct 10 22:42:17 UTC 2024 2024-10-11 01:59:58 +02:00
xfce Tue Aug 20 18:23:52 UTC 2024 2024-08-20 20:59:42 +02:00
y Sun May 12 19:10:12 UTC 2024 2024-05-12 21:28:58 +02:00
buildlist-from-changelog.sh Fri Oct 8 03:23:28 UTC 2021 2021-10-08 08:59:45 +02:00
make_world.sh Wed Jun 8 19:15:34 UTC 2022 2022-06-09 07:00:13 +02:00
README.TXT Wed Feb 2 08:21:48 UTC 2022 2022-02-02 11:59:53 +01:00

This is the source used for Slackware.

To look for a particular bit of source (let's say for 'cp'), first you would
look for the full path:

fuzzy:~# which cp
/bin/cp

Then, you grep for the package it came from. Note that the leading '/'
is removed, and ^ and $ mark the beginning and end of the pattern to match:

fuzzy:~# grep ^bin/cp$ /var/lib/pkgtools/packages/*
/var/lib/pkgtools/packages/coreutils-9.0-x86_64-3:bin/cp

From this, you can see that 'cp' came from the coreutils-9.0-x86_64-3 package.
The source will be found in a corresponding subdirectory. In this case, that
would be ./a/coreutils/.

All of these packages have scripts that extract, patch, and compile the source
automatically. These are the 'SlackBuild' scripts.

Have fun!

---
Patrick J. Volkerding
volkerdi@slackware.com