1
0
Fork 0
mirror of git://slackware.nl/current.git synced 2025-01-17 18:12:36 +01:00
slackware-current/source
Patrick J Volkerding f5b23a008b Wed Jul 27 19:17:38 UTC 2022
l/tevent-0.13.0-x86_64-1.txz:  Upgraded.
n/samba-4.16.4-x86_64-1.txz:  Upgraded.
  This update fixes the following security issues:
  Samba AD users can bypass certain restrictions associated with changing
  passwords.
  Samba AD users can forge password change requests for any user.
  Samba AD users can crash the server process with an LDAP add or modify
  request.
  Samba AD users can induce a use-after-free in the server process with an
  LDAP add or modify request.
  Server memory information leak via SMB1.
  For more information, see:
    https://www.samba.org/samba/security/CVE-2022-2031.html
    https://www.samba.org/samba/security/CVE-2022-32744.html
    https://www.samba.org/samba/security/CVE-2022-32745.html
    https://www.samba.org/samba/security/CVE-2022-32746.html
    https://www.samba.org/samba/security/CVE-2022-32742.html
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2031
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32744
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32745
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742
  (* Security fix *)
2022-07-28 07:00:16 +02:00
..
a Tue Jul 26 19:27:53 UTC 2022 2022-07-27 07:00:18 +02:00
ap Mon Jul 18 15:44:48 UTC 2022 2022-07-19 07:00:09 +02:00
d Mon Jul 25 20:53:49 UTC 2022 2022-07-26 07:00:12 +02:00
e Tue Apr 5 19:16:30 UTC 2022 2022-04-06 06:59:43 +02:00
f Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
installer Fri Jul 1 01:23:50 UTC 2022 2022-07-01 07:00:12 +02:00
k Sun Jul 24 22:00:30 UTC 2022 2022-07-25 07:00:13 +02:00
kde Thu Jul 21 18:13:18 UTC 2022 2022-07-22 07:00:10 +02:00
l Tue Jul 26 19:27:53 UTC 2022 2022-07-27 07:00:18 +02:00
n Wed Jul 27 19:17:38 UTC 2022 2022-07-28 07:00:16 +02:00
t Tue Jun 28 19:16:08 UTC 2022 2022-06-29 07:00:11 +02:00
tcl Thu Feb 10 01:46:55 UTC 2022 2022-02-10 08:07:49 +01:00
x Thu Jul 14 18:48:34 UTC 2022 2022-07-15 07:00:18 +02:00
xap Sun Jul 10 18:49:34 UTC 2022 2022-07-11 07:00:12 +02:00
xfce Wed Jul 13 19:56:59 UTC 2022 2022-07-14 09:00:16 +02:00
y Thu Feb 10 01:46:55 UTC 2022 2022-02-10 08:07:49 +01:00
buildlist-from-changelog.sh Fri Oct 8 03:23:28 UTC 2021 2021-10-08 08:59:45 +02:00
make_world.sh Wed Jun 8 19:15:34 UTC 2022 2022-06-09 07:00:13 +02:00
README.TXT Wed Feb 2 08:21:48 UTC 2022 2022-02-02 11:59:53 +01:00

This is the source used for Slackware.

To look for a particular bit of source (let's say for 'cp'), first you would
look for the full path:

fuzzy:~# which cp
/bin/cp

Then, you grep for the package it came from. Note that the leading '/'
is removed, and ^ and $ mark the beginning and end of the pattern to match:

fuzzy:~# grep ^bin/cp$ /var/lib/pkgtools/packages/*
/var/lib/pkgtools/packages/coreutils-9.0-x86_64-3:bin/cp

From this, you can see that 'cp' came from the coreutils-9.0-x86_64-3 package.
The source will be found in a corresponding subdirectory. In this case, that
would be ./a/coreutils/.

All of these packages have scripts that extract, patch, and compile the source
automatically. These are the 'SlackBuild' scripts.

Have fun!

---
Patrick J. Volkerding
volkerdi@slackware.com