slackware-current/source
Patrick J Volkerding aae4a0adca Tue Nov 26 22:05:37 UTC 2024
a/mkinitrd-1.4.11-x86_64-51.txz:  Rebuilt.
  remove-orphaned-initrds: fix report about dangling symlinks from --dry-run.
  Thanks to Mechanikx.
  setup.01.mkinitrd: report if symlinks are created.
ap/mariadb-11.4.4-x86_64-4.txz:  Rebuilt.
  /etc/default/mariadb: it appears that the correct option to skip SSL is
  --skip-ssl as in mariadb(1), not the --disable-ssl that was mentioned on the
  changes-improvements-in-mariadb-11-4 page.
  Thanks to rocknrobin and Windu.
l/mozjs128-128.5.0esr-x86_64-1.txz:  Upgraded.
n/netatalk-4.0.7-x86_64-1.txz:  Upgraded.
n/samba-4.21.2-x86_64-1.txz:  Upgraded.
xap/mozilla-firefox-128.5.0esr-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/firefox/128.5.0/releasenotes/
    https://www.mozilla.org/security/advisories/mfsa2024-64
    https://www.cve.org/CVERecord?id=CVE-2024-11691
    https://www.cve.org/CVERecord?id=CVE-2024-11692
    https://www.cve.org/CVERecord?id=CVE-2024-11693
    https://www.cve.org/CVERecord?id=CVE-2024-11694
    https://www.cve.org/CVERecord?id=CVE-2024-11695
    https://www.cve.org/CVERecord?id=CVE-2024-11696
    https://www.cve.org/CVERecord?id=CVE-2024-11697
    https://www.cve.org/CVERecord?id=CVE-2024-11698
    https://www.cve.org/CVERecord?id=CVE-2024-11699
  (* Security fix *)
xap/mozilla-thunderbird-128.5.0esr-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/thunderbird/128.5.0esr/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2024-68/
    https://www.cve.org/CVERecord?id=CVE-2024-11691
    https://www.cve.org/CVERecord?id=CVE-2024-11692
    https://www.cve.org/CVERecord?id=CVE-2024-11693
    https://www.cve.org/CVERecord?id=CVE-2024-11694
    https://www.cve.org/CVERecord?id=CVE-2024-11695
    https://www.cve.org/CVERecord?id=CVE-2024-11696
    https://www.cve.org/CVERecord?id=CVE-2024-11697
    https://www.cve.org/CVERecord?id=CVE-2024-11698
    https://www.cve.org/CVERecord?id=CVE-2024-11699
  (* Security fix *)
2024-11-27 00:34:09 +01:00
..
a Tue Nov 26 22:05:37 UTC 2024 2024-11-27 00:34:09 +01:00
ap Tue Nov 26 22:05:37 UTC 2024 2024-11-27 00:34:09 +01:00
d Fri Nov 22 22:08:18 UTC 2024 2024-11-23 00:48:10 +01:00
e Tue Jul 23 18:54:25 UTC 2024 2024-07-23 22:50:05 +02:00
f Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
installer Thu Nov 14 20:00:55 UTC 2024 2024-11-14 21:42:55 +01:00
k Fri Nov 22 22:08:18 UTC 2024 2024-11-23 00:48:10 +01:00
kde Fri Nov 22 22:08:18 UTC 2024 2024-11-23 00:48:10 +01:00
l Mon Nov 25 21:19:23 UTC 2024 2024-11-25 23:02:40 +01:00
n Tue Nov 26 22:05:37 UTC 2024 2024-11-27 00:34:09 +01:00
t Mon Oct 28 21:22:48 UTC 2024 2024-10-28 23:11:58 +01:00
tcl Tue Sep 17 23:29:04 UTC 2024 2024-09-18 02:05:31 +02:00
x Fri Nov 22 22:08:18 UTC 2024 2024-11-23 00:48:10 +01:00
xap Fri Nov 22 22:08:18 UTC 2024 2024-11-23 00:48:10 +01:00
xfce Sun Nov 24 23:09:54 UTC 2024 2024-11-25 00:29:25 +01:00
y Sun Nov 10 20:38:31 UTC 2024 2024-11-10 22:34:23 +01:00
buildlist-from-changelog.sh Fri Oct 8 03:23:28 UTC 2021 2021-10-08 08:59:45 +02:00
make_world.sh Wed Jun 8 19:15:34 UTC 2022 2022-06-09 07:00:13 +02:00
README.TXT Wed Feb 2 08:21:48 UTC 2022 2022-02-02 11:59:53 +01:00

This is the source used for Slackware.

To look for a particular bit of source (let's say for 'cp'), first you would
look for the full path:

fuzzy:~# which cp
/bin/cp

Then, you grep for the package it came from. Note that the leading '/'
is removed, and ^ and $ mark the beginning and end of the pattern to match:

fuzzy:~# grep ^bin/cp$ /var/lib/pkgtools/packages/*
/var/lib/pkgtools/packages/coreutils-9.0-x86_64-3:bin/cp

From this, you can see that 'cp' came from the coreutils-9.0-x86_64-3 package.
The source will be found in a corresponding subdirectory. In this case, that
would be ./a/coreutils/.

All of these packages have scripts that extract, patch, and compile the source
automatically. These are the 'SlackBuild' scripts.

Have fun!

---
Patrick J. Volkerding
volkerdi@slackware.com