slackware-current/source
Patrick J Volkerding b689ecb882 Fri Mar 31 18:01:09 UTC 2023
a/kernel-generic-6.1.22-x86_64-1.txz:  Upgraded.
a/kernel-huge-6.1.22-x86_64-1.txz:  Upgraded.
a/kernel-modules-6.1.22-x86_64-1.txz:  Upgraded.
a/mkinitrd-1.4.11-x86_64-32.txz:  Rebuilt.
  Add /lib/firmware directory to _initrd-tree.tar.gz. Thanks to walecha.
d/cmake-3.26.2-x86_64-1.txz:  Upgraded.
d/kernel-headers-6.1.22-x86-1.txz:  Upgraded.
d/llvm-16.0.0-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
  Thanks to Heinz Wiesinger for the assistance.
  Compiled with -DLLVM_BUILD_LLVM_DYLIB=ON -DLLVM_LINK_LLVM_DYLIB=ON
  -DCLANG_LINK_CLANG_DYLIB=ON.
  I think we'll get 16.0.1 next week if we need to make any adjustments.
d/ruby-3.2.2-x86_64-1.txz:  Upgraded.
  This update fixes security issues:
  ReDoS vulnerability in URI.
  ReDoS vulnerability in Time.
  For more information, see:
    https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/
    https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/
    https://www.cve.org/CVERecord?id=CVE-2023-28755
    https://www.cve.org/CVERecord?id=CVE-2023-28756
  (* Security fix *)
k/kernel-source-6.1.22-noarch-1.txz:  Upgraded.
kde/kdevelop-22.12.3-x86_64-2.txz:  Rebuilt.
  Recompiled against llvm-16.0.0.
l/openexr-3.1.7-x86_64-1.txz:  Upgraded.
l/qt5-5.15.8_20230325_c1a3e988-x86_64-1.txz:  Upgraded.
  Compiled against llvm-16.0.0.
l/spirv-llvm-translator-16.0.0-x86_64-1.txz:  Upgraded.
  Compiled against llvm-16.0.0.
  Thanks to Heinz Wiesinger for finding the fix for -DBUILD_SHARED_LIBS=ON.
n/pssh-2.3.5-x86_64-1.txz:  Upgraded.
n/samba-4.18.1-x86_64-1.txz:  Upgraded.
  This update fixes security issues:
  An incomplete access check on dnsHostName allows authenticated but otherwise
  unprivileged users to delete this attribute from any object in the directory.
  The Samba AD DC administration tool, when operating against a remote LDAP
  server, will by default send new or reset passwords over a signed-only
  connection.
  The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential
  attribute disclosure via LDAP filters was insufficient and an attacker may
  be able to obtain confidential BitLocker recovery keys from a Samba AD DC.
  Installations with such secrets in their Samba AD should assume they have
  been obtained and need replacing.
  For more information, see:
    https://www.samba.org/samba/security/CVE-2023-0225.html
    https://www.samba.org/samba/security/CVE-2023-0922.html
    https://www.samba.org/samba/security/CVE-2023-0614.html
    https://www.cve.org/CVERecord?id=CVE-2023-0225
    https://www.cve.org/CVERecord?id=CVE-2023-0922
    https://www.cve.org/CVERecord?id=CVE-2023-0614
  (* Security fix *)
x/mesa-23.0.1-x86_64-2.txz:  Rebuilt.
  Recompiled against llvm-16.0.0 and spirv-llvm-translator-16.0.0.
xap/seamonkey-2.53.16-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    https://www.seamonkey-project.org/releases/seamonkey2.53.16
  (* Security fix *)
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
testing/packages/rust-1.68.2-x86_64-2.txz:  Rebuilt.
  Use the bundled LLVM rather than the system LLVM.
  This version of Rust actually does compile with llvm-16.0.0, but since it
  bundles LLVM 15 let's let it use that for now.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2023-03-31 21:43:36 +02:00
..
a Fri Mar 31 18:01:09 UTC 2023 2023-03-31 21:43:36 +02:00
ap Mon Mar 20 18:26:23 UTC 2023 2023-03-20 21:32:56 +01:00
d Fri Mar 31 18:01:09 UTC 2023 2023-03-31 21:43:36 +02:00
e Thu Dec 8 22:48:34 UTC 2022 2022-12-09 00:41:09 +01:00
f Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
installer Tue Mar 21 21:18:59 UTC 2023 2023-03-21 23:41:13 +01:00
k Fri Mar 31 18:01:09 UTC 2023 2023-03-31 21:43:36 +02:00
kde Fri Mar 31 18:01:09 UTC 2023 2023-03-31 21:43:36 +02:00
l Fri Mar 31 18:01:09 UTC 2023 2023-03-31 21:43:36 +02:00
n Fri Mar 31 18:01:09 UTC 2023 2023-03-31 21:43:36 +02:00
t Wed Mar 22 20:22:25 UTC 2023 2023-03-22 22:37:07 +01:00
tcl Wed Nov 23 19:51:17 UTC 2022 2022-11-24 07:00:17 +01:00
x Fri Mar 31 18:01:09 UTC 2023 2023-03-31 21:43:36 +02:00
xap Wed Mar 8 20:26:54 UTC 2023 2023-03-08 22:40:50 +01:00
xfce Tue Mar 21 21:18:59 UTC 2023 2023-03-21 23:41:13 +01:00
y Wed Mar 8 20:26:54 UTC 2023 2023-03-08 22:40:50 +01:00
buildlist-from-changelog.sh Fri Oct 8 03:23:28 UTC 2021 2021-10-08 08:59:45 +02:00
make_world.sh Wed Jun 8 19:15:34 UTC 2022 2022-06-09 07:00:13 +02:00
README.TXT Wed Feb 2 08:21:48 UTC 2022 2022-02-02 11:59:53 +01:00

This is the source used for Slackware.

To look for a particular bit of source (let's say for 'cp'), first you would
look for the full path:

fuzzy:~# which cp
/bin/cp

Then, you grep for the package it came from. Note that the leading '/'
is removed, and ^ and $ mark the beginning and end of the pattern to match:

fuzzy:~# grep ^bin/cp$ /var/lib/pkgtools/packages/*
/var/lib/pkgtools/packages/coreutils-9.0-x86_64-3:bin/cp

From this, you can see that 'cp' came from the coreutils-9.0-x86_64-3 package.
The source will be found in a corresponding subdirectory. In this case, that
would be ./a/coreutils/.

All of these packages have scripts that extract, patch, and compile the source
automatically. These are the 'SlackBuild' scripts.

Have fun!

---
Patrick J. Volkerding
volkerdi@slackware.com