slackware-current/source
Patrick J Volkerding bd42aca52d Tue Feb 1 04:37:04 UTC 2022
The sepulchral voice intones, "The cave is now closed."
kde/falkon-3.2.0-x86_64-1.txz:  Upgraded.
kde/ktexteditor-5.90.0-x86_64-2.txz:  Rebuilt.
  [PATCH] only start programs in user's path.
  [PATCH] only execute diff in path.
  Thanks to gmgf.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23853
  (* Security fix *)
l/libcanberra-0.30-x86_64-9.txz:  Rebuilt.
  Fix a bug crashing some applications in Wayland desktops.
  Thanks to 01micko.
n/samba-4.15.5-x86_64-1.txz:  Upgraded.
  This is a security release in order to address the following defects:
  UNIX extensions in SMB1 disclose whether the outside target of a symlink
  exists.
  Out-of-Bound Read/Write on Samba vfs_fruit module. This vulnerability
  allows remote attackers to execute arbitrary code as root on affected Samba
  installations that use the VFS module vfs_fruit.
  Re-adding an SPN skips subsequent SPN conflict checks. An attacker who has
  the ability to write to an account can exploit this to perform a
  denial-of-service attack by adding an SPN that matches an existing service.
  Additionally, an attacker who can intercept traffic can impersonate existing
  services, resulting in a loss of confidentiality and integrity.
  For more information, see:
    https://www.samba.org/samba/security/CVE-2021-44141.html
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44141
    https://www.samba.org/samba/security/CVE-2021-44142.html
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142
    https://www.samba.org/samba/security/CVE-2022-0336.html
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336
  (* Security fix *)
x/xterm-370-x86_64-7.txz:  Rebuilt.
  Rebuilt with --disable-sixel-graphics to fix a buffer overflow.
  Thanks to gmgf.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24130
  (* Security fix *)
testing/source/linux-5.16.4-configs/*:  Added.
  Sample config files to build 5.16.4 Linux kernels.
2022-02-01 08:59:52 +01:00
..
a Sun Jan 30 20:48:46 UTC 2022 2022-01-31 08:59:52 +01:00
ap Sun Jan 30 20:48:46 UTC 2022 2022-01-31 08:59:52 +01:00
d Thu Jan 27 22:43:13 UTC 2022 2022-01-28 08:59:57 +01:00
e Fri Mar 26 03:07:35 UTC 2021 2021-03-26 08:59:54 +01:00
f Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
installer Sun Jan 23 01:17:39 UTC 2022 2022-01-23 09:00:00 +01:00
k Sat Jan 29 19:23:50 UTC 2022 2022-01-30 08:59:52 +01:00
kde Tue Feb 1 04:37:04 UTC 2022 2022-02-01 08:59:52 +01:00
l Tue Feb 1 04:37:04 UTC 2022 2022-02-01 08:59:52 +01:00
n Tue Feb 1 04:37:04 UTC 2022 2022-02-01 08:59:52 +01:00
t Sun Oct 10 22:20:01 UTC 2021 2021-10-11 08:59:46 +02:00
tcl Sat Nov 6 20:24:12 UTC 2021 2021-11-07 03:00:02 +01:00
x Tue Feb 1 04:37:04 UTC 2022 2022-02-01 08:59:52 +01:00
xap Mon Jan 17 22:44:42 UTC 2022 2022-01-18 08:59:56 +01:00
xfce Mon Dec 27 23:06:00 UTC 2021 2021-12-28 08:59:56 +01:00
y Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
buildlist-from-changelog.sh Fri Oct 8 03:23:28 UTC 2021 2021-10-08 08:59:45 +02:00
make_world.sh Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
README.TXT Slackware 14.0 2018-05-31 22:51:55 +02:00

This is the source used for Slackware.

To look for a particular bit of source (let's say for 'cp'), first you would
look for the full path:

fuzzy:~# which cp
/bin/cp

Then, you grep for the package it came from. Note that the leading '/'
is removed:

fuzzy:~# grep bin/cp /var/log/packages/*
/var/log/packages/cpio-2.4.2.91-i386-1:bin/cpio
/var/log/packages/fileutils-4.1-i386-2:bin/cp
/var/log/packages/gcc-2.95.3-i386-2:usr/bin/cpp
/var/log/packages/gnome-applets-1.4.0.5-i386-1:usr/bin/cpumemusage_applet


From this, you can see that 'cp' came from the fileutils-4.1-i386-2 package.
The source will be found in a corresponding subdirectory.  In this case, that
would be ./a/bin.   Don't be fooled into thinking that the _bin.tar.gz in this
directory is the package with the source code -- anything starting with '_' is
just a framework package full of empty files with the correct permissions and 
ownerships for the completed package to use.

Many of these packages now have scripts that untar, patch, and compile the
source automatically.  These are the 'SlackBuild' scripts.  Moving back to the
example above, you can figure out which package the bin/cp source came from by
examining the SlackBuild script.

Have fun!

---
Patrick J. Volkerding
volkerdi@slackware.com