slackware-current/source
Patrick J Volkerding a55e318a86 Thu Mar 17 19:46:28 UTC 2022
Have a great day, everyone! Off to enjoy a couple Guinness. :-)
a/kernel-generic-5.16.15-x86_64-1.txz:  Upgraded.
a/kernel-huge-5.16.15-x86_64-1.txz:  Upgraded.
a/kernel-modules-5.16.15-x86_64-1.txz:  Upgraded.
a/openssl-solibs-1.1.1n-x86_64-1.txz:  Upgraded.
d/kernel-headers-5.16.15-x86-1.txz:  Upgraded.
d/meson-0.61.3-x86_64-1.txz:  Upgraded.
k/kernel-source-5.16.15-noarch-1.txz:  Upgraded.
kde/kstars-3.5.8-x86_64-1.txz:  Upgraded.
l/nodejs-16.14.1-x86_64-1.txz:  Upgraded.
n/bind-9.18.1-x86_64-1.txz:  Upgraded.
  This update fixes bugs and the following security issues:
  An assertion could occur in resume_dslookup() if the fetch had been shut
  down earlier.
  Lookups involving a DNAME could trigger an INSIST when "synth-from-dnssec"
  was enabled.
  A synchronous call to closehandle_cb() caused isc__nm_process_sock_buffer()
  to be called recursively, which in turn left TCP connections hanging in the
  CLOSE_WAIT state blocking indefinitely when out-of-order processing was
  disabled.
  The rules for acceptance of records into the cache have been tightened to
  prevent the possibility of poisoning if forwarders send records outside
  the configured bailiwick.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0667
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0635
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0396
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25220
  (* Security fix *)
n/bluez-5.64-x86_64-1.txz:  Upgraded.
n/mobile-broadband-provider-info-20220316-x86_64-1.txz:  Upgraded.
n/openssl-1.1.1n-x86_64-1.txz:  Upgraded.
  This update fixes a high severity security issue:
  The BN_mod_sqrt() function, which computes a modular square root, contains
  a bug that can cause it to loop forever for non-prime moduli.
  For more information, see:
    https://www.openssl.org/news/secadv/20220315.txt
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778
  (* Security fix *)
n/openvpn-2.5.6-x86_64-1.txz:  Upgraded.
x/ibus-1.5.26-x86_64-1.txz:  Upgraded.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2022-03-18 06:59:44 +01:00
..
a Thu Mar 10 20:12:48 UTC 2022 2022-03-11 06:59:44 +01:00
ap Mon Mar 7 01:57:45 UTC 2022 2022-03-07 06:59:43 +01:00
d Mon Mar 14 01:55:37 UTC 2022 2022-03-14 06:59:44 +01:00
e Mon Feb 21 20:21:38 UTC 2022 2022-02-22 06:59:43 +01:00
f Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
installer Fri Feb 11 20:36:58 UTC 2022 2022-02-12 00:39:50 +01:00
k Thu Mar 17 19:46:28 UTC 2022 2022-03-18 06:59:44 +01:00
kde Mon Mar 14 01:55:37 UTC 2022 2022-03-14 06:59:44 +01:00
l Wed Mar 16 01:46:29 UTC 2022 2022-03-16 06:59:45 +01:00
n Thu Mar 17 19:46:28 UTC 2022 2022-03-18 06:59:44 +01:00
t Thu Feb 24 05:50:40 UTC 2022 2022-02-24 22:59:46 +01:00
tcl Thu Feb 10 01:46:55 UTC 2022 2022-02-10 08:07:49 +01:00
x Thu Mar 17 19:46:28 UTC 2022 2022-03-18 06:59:44 +01:00
xap Thu Mar 10 20:12:48 UTC 2022 2022-03-11 06:59:44 +01:00
xfce Sat Mar 12 20:57:35 UTC 2022 2022-03-13 06:59:45 +01:00
y Thu Feb 10 01:46:55 UTC 2022 2022-02-10 08:07:49 +01:00
buildlist-from-changelog.sh Fri Oct 8 03:23:28 UTC 2021 2021-10-08 08:59:45 +02:00
make_world.sh Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
README.TXT Wed Feb 2 08:21:48 UTC 2022 2022-02-02 11:59:53 +01:00

This is the source used for Slackware.

To look for a particular bit of source (let's say for 'cp'), first you would
look for the full path:

fuzzy:~# which cp
/bin/cp

Then, you grep for the package it came from. Note that the leading '/'
is removed, and ^ and $ mark the beginning and end of the pattern to match:

fuzzy:~# grep ^bin/cp$ /var/lib/pkgtools/packages/*
/var/lib/pkgtools/packages/coreutils-9.0-x86_64-3:bin/cp

From this, you can see that 'cp' came from the coreutils-9.0-x86_64-3 package.
The source will be found in a corresponding subdirectory. In this case, that
would be ./a/coreutils/.

All of these packages have scripts that extract, patch, and compile the source
automatically. These are the 'SlackBuild' scripts.

Have fun!

---
Patrick J. Volkerding
volkerdi@slackware.com