slackware-current/source
Patrick J Volkerding f2dca0d8e5 Wed Jun 8 19:15:34 UTC 2022
ap/sudo-1.9.11p1-x86_64-1.txz:  Upgraded.
kde/digikam-7.6.0-x86_64-2.txz:  Rebuilt.
  Recompiled against opencv-4.6.0.
l/gst-plugins-bad-free-1.20.2-x86_64-2.txz:  Rebuilt.
  Recompiled against opencv-4.6.0.
l/opencv-4.6.0-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
n/NetworkManager-1.36.6-x86_64-1.txz:  Upgraded.
n/epic5-2.1.11-x86_64-1.txz:  Upgraded.
n/httpd-2.4.54-x86_64-1.txz:  Upgraded.
  This update fixes bugs and the following security issues:
  mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism.
  Information Disclosure in mod_lua with websockets.
  mod_sed denial of service.
  Denial of service in mod_lua r:parsebody.
  Read beyond bounds in ap_strcmp_match().
  Read beyond bounds via ap_rwrite().
  Read beyond bounds in mod_isapi.
  mod_proxy_ajp: Possible request smuggling.
  For more information, see:
    https://downloads.apache.org/httpd/CHANGES_2.4.54
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31813
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30556
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30522
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29404
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28615
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28614
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28330
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26377
  (* Security fix *)
n/libnftnl-1.2.2-x86_64-1.txz:  Upgraded.
n/nftables-1.0.4-x86_64-1.txz:  Upgraded.
2022-06-09 07:00:13 +02:00
..
a Thu Jun 2 19:42:06 UTC 2022 2022-06-03 07:00:13 +02:00
ap Fri Jun 3 16:51:58 UTC 2022 2022-06-04 07:00:07 +02:00
d Mon Jun 6 20:57:15 UTC 2022 2022-06-07 07:00:10 +02:00
e Tue Apr 5 19:16:30 UTC 2022 2022-04-06 06:59:43 +02:00
f Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
installer Fri Feb 11 20:36:58 UTC 2022 2022-02-12 00:39:50 +01:00
k Mon Jun 6 20:57:15 UTC 2022 2022-06-07 07:00:10 +02:00
kde Wed Jun 8 19:15:34 UTC 2022 2022-06-09 07:00:13 +02:00
l Wed Jun 8 19:15:34 UTC 2022 2022-06-09 07:00:13 +02:00
n Wed Jun 8 19:15:34 UTC 2022 2022-06-09 07:00:13 +02:00
t Mon Apr 11 20:49:27 UTC 2022 2022-04-12 06:59:46 +02:00
tcl Thu Feb 10 01:46:55 UTC 2022 2022-02-10 08:07:49 +01:00
x Sat Jun 4 18:43:17 UTC 2022 2022-06-05 07:00:07 +02:00
xap Sat Jun 4 18:43:17 UTC 2022 2022-06-05 07:00:07 +02:00
xfce Fri Apr 22 21:20:18 UTC 2022 2022-04-23 06:59:44 +02:00
y Thu Feb 10 01:46:55 UTC 2022 2022-02-10 08:07:49 +01:00
buildlist-from-changelog.sh Fri Oct 8 03:23:28 UTC 2021 2021-10-08 08:59:45 +02:00
make_world.sh Wed Jun 8 19:15:34 UTC 2022 2022-06-09 07:00:13 +02:00
README.TXT Wed Feb 2 08:21:48 UTC 2022 2022-02-02 11:59:53 +01:00

This is the source used for Slackware.

To look for a particular bit of source (let's say for 'cp'), first you would
look for the full path:

fuzzy:~# which cp
/bin/cp

Then, you grep for the package it came from. Note that the leading '/'
is removed, and ^ and $ mark the beginning and end of the pattern to match:

fuzzy:~# grep ^bin/cp$ /var/lib/pkgtools/packages/*
/var/lib/pkgtools/packages/coreutils-9.0-x86_64-3:bin/cp

From this, you can see that 'cp' came from the coreutils-9.0-x86_64-3 package.
The source will be found in a corresponding subdirectory. In this case, that
would be ./a/coreutils/.

All of these packages have scripts that extract, patch, and compile the source
automatically. These are the 'SlackBuild' scripts.

Have fun!

---
Patrick J. Volkerding
volkerdi@slackware.com