mirror of
git://slackware.nl/current.git
synced 2025-01-14 08:01:11 +01:00
ed81ac8dda
a/elogind-252.23-x86_64-3.txz: Rebuilt. All right, it's time to stop the bleeding (edge). This has been verified as the last working version of elogind, so we'll revert for now while moving the newer sources into /testing. We didn't actually *need* the 255 branch for libgudev (I was mistakenly under that impression), so this will be fine for now. We'll keep an eye on upstream and move forward when things settle down. d/vala-0.56.17-x86_64-1.txz: Upgraded. l/gdk-pixbuf2-2.42.11-x86_64-1.txz: Upgraded. l/gtk4-4.14.3-x86_64-1.txz: Upgraded. l/polkit-124-x86_64-2.txz: Rebuilt. Recompiled against elogind-252.23. l/python-sphinx-7.3.7-x86_64-1.txz: Upgraded. n/NetworkManager-1.46.0-x86_64-2.txz: Rebuilt. Build with meson instead of autotools, since setting session_tracking to elogind is ignored with autotools, and is set to consolekit instead. While this didn't seem to make a difference in practice, better to get this right now and rule it out as part of the issue. Thanks to marav and LuckyCyborg for the options hints. x/xdg-desktop-portal-1.18.4-x86_64-1.txz: Upgraded. xap/freerdp-2.11.6-x86_64-1.txz: Upgraded. This release is a security release and addresses multiple issues: [Low] OutOfBound Read in zgfx_decompress_segment. [Moderate] Integer overflow & OutOfBound Write in clear_decompress_residual_data. [Low] integer underflow in nsc_rle_decode. [Low] OutOfBound Read in planar_skip_plane_rle. [Low] OutOfBound Read in ncrush_decompress. [Low] OutOfBound Read in interleaved_decompress. For more information, see: https://www.cve.org/CVERecord?id=CVE-2024-32041 https://www.cve.org/CVERecord?id=CVE-2024-32039 https://www.cve.org/CVERecord?id=CVE-2024-32040 https://www.cve.org/CVERecord?id=CVE-2024-32458 https://www.cve.org/CVERecord?id=CVE-2024-32459 https://www.cve.org/CVERecord?id=CVE-2024-32460 (* Security fix *) |
||
---|---|---|
.. | ||
a | ||
ap | ||
d | ||
e | ||
f | ||
installer | ||
k | ||
kde | ||
l | ||
n | ||
t | ||
tcl | ||
x | ||
xap | ||
xfce | ||
y | ||
buildlist-from-changelog.sh | ||
make_world.sh | ||
README.TXT |
This is the source used for Slackware. To look for a particular bit of source (let's say for 'cp'), first you would look for the full path: fuzzy:~# which cp /bin/cp Then, you grep for the package it came from. Note that the leading '/' is removed, and ^ and $ mark the beginning and end of the pattern to match: fuzzy:~# grep ^bin/cp$ /var/lib/pkgtools/packages/* /var/lib/pkgtools/packages/coreutils-9.0-x86_64-3:bin/cp From this, you can see that 'cp' came from the coreutils-9.0-x86_64-3 package. The source will be found in a corresponding subdirectory. In this case, that would be ./a/coreutils/. All of these packages have scripts that extract, patch, and compile the source automatically. These are the 'SlackBuild' scripts. Have fun! --- Patrick J. Volkerding volkerdi@slackware.com