1
0
Fork 0
mirror of git://slackware.nl/current.git synced 2025-01-28 08:02:25 +01:00
slackware-current/source
Patrick J Volkerding bfece22130 Wed Apr 6 20:23:46 UTC 2022
a/haveged-1.9.17-x86_64-2.txz:  Rebuilt.
  Install /etc/rc.d/rc.haveged as non-executable. For existing installations
  running a recent kernel, it is safe to turn this off.
  Back when we added the haveged package we were using the 4.4 kernel, but
  since Linux 5.4 this same entropy generating algorithm has been built into
  the kernel, so there's no reason to also run it in userspace. We'll keep
  the package around (for now, anyway) in case someone might be running an
  old kernel. Thanks to Jason A. Donenfeld.
a/sysvinit-scripts-15.0-noarch-10.txz:  Rebuilt.
  rc.S, rc.6: use the seedrng utility to seed and initialize the kernel
  random number generator and generate a new seed.
  If seedrng is missing, we'll attempt to do these things with scripting.
  Thanks to Jason A. Donenfeld for hints about how to make a modest
  improvement in that regard (blame me for any problems with my own changes),
  but because you can't force the kernel RNG to initialize with a script
  (it needs an ioctl), you won't get the same guarantees that you do when
  using the new seedrng utility.
a/util-linux-2.38-x86_64-2.txz:  Rebuilt.
  Added seedrng utility, used to seed and initialize the kernel random number
  generator and to generate new seeds for carrying entropy across reboots.
  Thanks to Jason A. Donenfeld.
n/libmnl-1.0.5-x86_64-1.txz:  Upgraded.
n/libnfnetlink-1.0.2-x86_64-1.txz:  Upgraded.
xap/mozilla-thunderbird-91.8.0-x86_64-1.txz:  Upgraded.
  This release contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/thunderbird/91.8.0/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2022-15/
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289
  (* Security fix *)
2022-04-07 06:59:44 +02:00
..
a Wed Apr 6 20:23:46 UTC 2022 2022-04-07 06:59:44 +02:00
ap Tue Apr 5 19:16:30 UTC 2022 2022-04-06 06:59:43 +02:00
d Mon Mar 14 01:55:37 UTC 2022 2022-03-14 06:59:44 +01:00
e Tue Apr 5 19:16:30 UTC 2022 2022-04-06 06:59:43 +02:00
f Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
installer Fri Feb 11 20:36:58 UTC 2022 2022-02-12 00:39:50 +01:00
k Mon Mar 28 19:33:46 UTC 2022 2022-03-29 06:59:44 +02:00
kde Mon Mar 14 01:55:37 UTC 2022 2022-03-14 06:59:44 +01:00
l Tue Apr 5 19:16:30 UTC 2022 2022-04-06 06:59:43 +02:00
n Wed Apr 6 20:23:46 UTC 2022 2022-04-07 06:59:44 +02:00
t Thu Feb 24 05:50:40 UTC 2022 2022-02-24 22:59:46 +01:00
tcl Thu Feb 10 01:46:55 UTC 2022 2022-02-10 08:07:49 +01:00
x Tue Apr 5 19:16:30 UTC 2022 2022-04-06 06:59:43 +02:00
xap Wed Mar 23 17:25:36 UTC 2022 2022-03-24 06:59:46 +01:00
xfce Sun Apr 3 19:57:16 UTC 2022 2022-04-04 06:59:53 +02:00
y Thu Feb 10 01:46:55 UTC 2022 2022-02-10 08:07:49 +01:00
buildlist-from-changelog.sh Fri Oct 8 03:23:28 UTC 2021 2021-10-08 08:59:45 +02:00
make_world.sh Mon Feb 15 19:23:44 UTC 2021 2021-02-16 08:59:54 +01:00
README.TXT Wed Feb 2 08:21:48 UTC 2022 2022-02-02 11:59:53 +01:00

This is the source used for Slackware.

To look for a particular bit of source (let's say for 'cp'), first you would
look for the full path:

fuzzy:~# which cp
/bin/cp

Then, you grep for the package it came from. Note that the leading '/'
is removed, and ^ and $ mark the beginning and end of the pattern to match:

fuzzy:~# grep ^bin/cp$ /var/lib/pkgtools/packages/*
/var/lib/pkgtools/packages/coreutils-9.0-x86_64-3:bin/cp

From this, you can see that 'cp' came from the coreutils-9.0-x86_64-3 package.
The source will be found in a corresponding subdirectory. In this case, that
would be ./a/coreutils/.

All of these packages have scripts that extract, patch, and compile the source
automatically. These are the 'SlackBuild' scripts.

Have fun!

---
Patrick J. Volkerding
volkerdi@slackware.com