slackware-current/source
Patrick J Volkerding e0375de323 Thu Apr 4 20:49:23 UTC 2024
a/hwdata-0.381-noarch-1.txz:  Upgraded.
a/kernel-generic-6.6.25-x86_64-1.txz:  Upgraded.
a/kernel-huge-6.6.25-x86_64-1.txz:  Upgraded.
a/kernel-modules-6.6.25-x86_64-1.txz:  Upgraded.
d/cmake-3.29.1-x86_64-1.txz:  Upgraded.
d/kernel-headers-6.6.25-x86-1.txz:  Upgraded.
d/llvm-18.1.3-x86_64-1.txz:  Upgraded.
k/kernel-source-6.6.25-noarch-1.txz:  Upgraded.
kde/kstars-3.7.0-x86_64-1.txz:  Upgraded.
l/enchant-2.6.9-x86_64-1.txz:  Upgraded.
l/libclc-18.1.3-x86_64-1.txz:  Upgraded.
l/sof-firmware-2024.03-noarch-1.txz:  Upgraded.
n/gnutls-3.8.5-x86_64-1.txz:  Upgraded.
n/httpd-2.4.59-x86_64-1.txz:  Upgraded.
  This update fixes security issues:
  HTTP/2 DoS by memory exhaustion on endless continuation frames.
  HTTP Response Splitting in multiple modules.
  HTTP response splitting.
  For more information, see:
    https://downloads.apache.org/httpd/CHANGES_2.4.59
    https://www.cve.org/CVERecord?id=CVE-2024-27316
    https://www.cve.org/CVERecord?id=CVE-2024-24795
    https://www.cve.org/CVERecord?id=CVE-2023-38709
  (* Security fix *)
n/nghttp2-1.61.0-x86_64-1.txz:  Upgraded.
  This update fixes security issues:
  nghttp2 library keeps reading the unbounded number of HTTP/2 CONTINUATION
  frames even after a stream is reset to keep HPACK context in sync. This
  causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates
  this vulnerability by limiting the number of CONTINUATION frames it can
  accept after a HEADERS frame.
  For more information, see:
    https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q
    https://www.kb.cert.org/vuls/id/421644
    https://www.cve.org/CVERecord?id=CVE-2024-28182
  (* Security fix *)
x/xdg-desktop-portal-1.18.3-x86_64-1.txz:  Upgraded.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2024-04-04 23:55:21 +02:00
..
a Thu Apr 4 20:49:23 UTC 2024 2024-04-04 23:55:21 +02:00
ap Sun Mar 31 18:28:19 UTC 2024 2024-03-31 20:58:48 +02:00
d Thu Apr 4 20:49:23 UTC 2024 2024-04-04 23:55:21 +02:00
e Sun Mar 24 18:21:46 UTC 2024 2024-03-24 20:02:29 +01:00
f Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
installer Mon Mar 18 21:44:21 UTC 2024 2024-03-18 23:31:26 +01:00
k Thu Apr 4 20:49:23 UTC 2024 2024-04-04 23:55:21 +02:00
kde Mon Apr 1 19:02:42 UTC 2024 2024-04-02 21:29:20 +02:00
l Thu Apr 4 20:49:23 UTC 2024 2024-04-04 23:55:21 +02:00
n Thu Apr 4 20:49:23 UTC 2024 2024-04-04 23:55:21 +02:00
t Sat Feb 24 19:50:05 UTC 2024 2024-02-24 21:30:18 +01:00
tcl Fri Mar 1 22:13:28 UTC 2024 2024-03-02 00:36:00 +01:00
x Fri Mar 29 20:39:11 UTC 2024 2024-03-29 22:36:12 +01:00
xap Wed Apr 3 19:58:56 UTC 2024 2024-04-03 23:12:56 +02:00
xfce Thu Apr 4 20:49:23 UTC 2024 2024-04-04 23:55:21 +02:00
y Wed Mar 8 20:26:54 UTC 2023 2023-03-08 22:40:50 +01:00
buildlist-from-changelog.sh Fri Oct 8 03:23:28 UTC 2021 2021-10-08 08:59:45 +02:00
make_world.sh Wed Jun 8 19:15:34 UTC 2022 2022-06-09 07:00:13 +02:00
README.TXT Wed Feb 2 08:21:48 UTC 2022 2022-02-02 11:59:53 +01:00

This is the source used for Slackware.

To look for a particular bit of source (let's say for 'cp'), first you would
look for the full path:

fuzzy:~# which cp
/bin/cp

Then, you grep for the package it came from. Note that the leading '/'
is removed, and ^ and $ mark the beginning and end of the pattern to match:

fuzzy:~# grep ^bin/cp$ /var/lib/pkgtools/packages/*
/var/lib/pkgtools/packages/coreutils-9.0-x86_64-3:bin/cp

From this, you can see that 'cp' came from the coreutils-9.0-x86_64-3 package.
The source will be found in a corresponding subdirectory. In this case, that
would be ./a/coreutils/.

All of these packages have scripts that extract, patch, and compile the source
automatically. These are the 'SlackBuild' scripts.

Have fun!

---
Patrick J. Volkerding
volkerdi@slackware.com