slackware-current/source
Patrick J Volkerding 8daddd6079 Thu Sep 14 02:38:14 UTC 2023
a/kernel-firmware-20230907_dfa1146-noarch-1.txz:  Upgraded.
a/kernel-generic-6.1.53-x86_64-1.txz:  Upgraded.
a/kernel-huge-6.1.53-x86_64-1.txz:  Upgraded.
a/kernel-modules-6.1.53-x86_64-1.txz:  Upgraded.
ap/ghostscript-10.02.0-x86_64-1.txz:  Upgraded.
ap/vim-9.0.1897-x86_64-2.txz:  Rebuilt.
  Recompiled against libsodium-1.0.19.
d/cbindgen-0.26.0-x86_64-1.txz:  Upgraded.
d/kernel-headers-6.1.53-x86-1.txz:  Upgraded.
k/kernel-source-6.1.53-noarch-1.txz:  Upgraded.
kde/keysmith-23.08.0-x86_64-2.txz:  Rebuilt.
  Recompiled against libsodium-1.0.19.
l/glib2-2.78.0-x86_64-2.txz:  Rebuilt.
  [PATCH] gthreadedresolver: Fix race between source callbacks and finalize.
  Thanks to marav.
l/libarchive-3.7.2-x86_64-1.txz:  Upgraded.
  This update fixes multiple security vulnerabilities in the PAX writer:
  Heap overflow in url_encode() in archive_write_set_format_pax.c.
  NULL dereference in archive_write_pax_header_xattrs().
  Another NULL dereference in archive_write_pax_header_xattrs().
  NULL dereference in archive_write_pax_header_xattr().
  (* Security fix *)
l/librsvg-2.56.4-x86_64-1.txz:  Upgraded.
l/libsodium-1.0.19-x86_64-1.txz:  Upgraded.
  Shared library .so-version bump.
n/curl-8.3.0-x86_64-1.txz:  Upgraded.
  This update fixes a security issue:
  HTTP headers eat all memory.
    https://curl.se/docs/CVE-2023-38039.html
    https://www.cve.org/CVERecord?id=CVE-2023-38039
  (* Security fix *)
n/dovecot-2.3.20-x86_64-4.txz:  Rebuilt.
  Recompiled against libsodium-1.0.19.
n/netatalk-3.1.16-x86_64-1.txz:  Upgraded.
  This update fixes bugs and security issues.
  Shared library .so-version bump.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2022-23121
    https://www.cve.org/CVERecord?id=CVE-2022-23123
  (* Security fix *)
n/openldap-2.6.6-x86_64-2.txz:  Rebuilt.
  Recompiled against libsodium-1.0.19.
n/php-8.2.10-x86_64-2.txz:  Rebuilt.
  Recompiled against libsodium-1.0.19.
n/proftpd-1.3.8-x86_64-4.txz:  Rebuilt.
  Recompiled against libsodium-1.0.19.
x/libglvnd-1.7.0-x86_64-1.txz:  Upgraded.
xap/mozilla-thunderbird-115.2.2-x86_64-1.txz:  Upgraded.
  This release contains a security fix for a critical heap buffer overflow.
  For more information, see:
    https://www.mozilla.org/en-US/thunderbird/115.2.2/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/
    https://www.cve.org/CVERecord?id=CVE-2023-4863
  (* Security fix *)
xap/vim-gvim-9.0.1897-x86_64-2.txz:  Rebuilt.
  Recompiled against libsodium-1.0.19.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2023-09-14 05:06:53 +02:00
..
a Tue Sep 5 20:00:30 UTC 2023 2023-09-05 22:32:07 +02:00
ap Thu Sep 14 02:38:14 UTC 2023 2023-09-14 05:06:53 +02:00
d Thu Sep 14 02:38:14 UTC 2023 2023-09-14 05:06:53 +02:00
e Sun Sep 10 18:09:58 UTC 2023 2023-09-10 21:10:01 +02:00
f Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
installer Wed Aug 16 20:45:00 UTC 2023 2023-08-16 23:44:50 +02:00
k Thu Sep 14 02:38:14 UTC 2023 2023-09-14 05:06:53 +02:00
kde Thu Sep 14 02:38:14 UTC 2023 2023-09-14 05:06:53 +02:00
l Thu Sep 14 02:38:14 UTC 2023 2023-09-14 05:06:53 +02:00
n Thu Sep 14 02:38:14 UTC 2023 2023-09-14 05:06:53 +02:00
t Thu Sep 7 02:04:52 UTC 2023 2023-09-07 04:44:48 +02:00
tcl Fri May 5 22:49:16 UTC 2023 2023-05-06 01:34:25 +02:00
x Thu Sep 14 02:38:14 UTC 2023 2023-09-14 05:06:53 +02:00
xap Fri Sep 1 20:16:14 UTC 2023 2023-09-01 23:02:29 +02:00
xfce Tue Aug 29 18:55:59 UTC 2023 2023-08-29 21:29:22 +02:00
y Wed Mar 8 20:26:54 UTC 2023 2023-03-08 22:40:50 +01:00
buildlist-from-changelog.sh Fri Oct 8 03:23:28 UTC 2021 2021-10-08 08:59:45 +02:00
make_world.sh Wed Jun 8 19:15:34 UTC 2022 2022-06-09 07:00:13 +02:00
README.TXT Wed Feb 2 08:21:48 UTC 2022 2022-02-02 11:59:53 +01:00

This is the source used for Slackware.

To look for a particular bit of source (let's say for 'cp'), first you would
look for the full path:

fuzzy:~# which cp
/bin/cp

Then, you grep for the package it came from. Note that the leading '/'
is removed, and ^ and $ mark the beginning and end of the pattern to match:

fuzzy:~# grep ^bin/cp$ /var/lib/pkgtools/packages/*
/var/lib/pkgtools/packages/coreutils-9.0-x86_64-3:bin/cp

From this, you can see that 'cp' came from the coreutils-9.0-x86_64-3 package.
The source will be found in a corresponding subdirectory. In this case, that
would be ./a/coreutils/.

All of these packages have scripts that extract, patch, and compile the source
automatically. These are the 'SlackBuild' scripts.

Have fun!

---
Patrick J. Volkerding
volkerdi@slackware.com