slackware-current/source
Patrick J Volkerding ed81ac8dda Fri Apr 19 19:36:17 UTC 2024
a/elogind-252.23-x86_64-3.txz:  Rebuilt.
  All right, it's time to stop the bleeding (edge). This has been verified as
  the last working version of elogind, so we'll revert for now while moving the
  newer sources into /testing. We didn't actually *need* the 255 branch for
  libgudev (I was mistakenly under that impression), so this will be fine for
  now. We'll keep an eye on upstream and move forward when things settle down.
d/vala-0.56.17-x86_64-1.txz:  Upgraded.
l/gdk-pixbuf2-2.42.11-x86_64-1.txz:  Upgraded.
l/gtk4-4.14.3-x86_64-1.txz:  Upgraded.
l/polkit-124-x86_64-2.txz:  Rebuilt.
  Recompiled against elogind-252.23.
l/python-sphinx-7.3.7-x86_64-1.txz:  Upgraded.
n/NetworkManager-1.46.0-x86_64-2.txz:  Rebuilt.
  Build with meson instead of autotools, since setting session_tracking to
  elogind is ignored with autotools, and is set to consolekit instead.
  While this didn't seem to make a difference in practice, better to get this
  right now and rule it out as part of the issue.
  Thanks to marav and LuckyCyborg for the options hints.
x/xdg-desktop-portal-1.18.4-x86_64-1.txz:  Upgraded.
xap/freerdp-2.11.6-x86_64-1.txz:  Upgraded.
  This release is a security release and addresses multiple issues:
  [Low] OutOfBound Read in zgfx_decompress_segment.
  [Moderate] Integer overflow & OutOfBound Write in
  clear_decompress_residual_data.
  [Low] integer underflow in nsc_rle_decode.
  [Low] OutOfBound Read in planar_skip_plane_rle.
  [Low] OutOfBound Read in ncrush_decompress.
  [Low] OutOfBound Read in interleaved_decompress.
  For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2024-32041
    https://www.cve.org/CVERecord?id=CVE-2024-32039
    https://www.cve.org/CVERecord?id=CVE-2024-32040
    https://www.cve.org/CVERecord?id=CVE-2024-32458
    https://www.cve.org/CVERecord?id=CVE-2024-32459
    https://www.cve.org/CVERecord?id=CVE-2024-32460
  (* Security fix *)
2024-04-19 21:59:51 +02:00
..
a Fri Apr 19 19:36:17 UTC 2024 2024-04-19 21:59:51 +02:00
ap Tue Apr 16 21:57:56 UTC 2024 2024-04-17 00:28:26 +02:00
d Thu Apr 18 19:17:30 UTC 2024 2024-04-18 22:19:52 +02:00
e Sun Mar 24 18:21:46 UTC 2024 2024-03-24 20:02:29 +01:00
f Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
installer Mon Mar 18 21:44:21 UTC 2024 2024-03-18 23:31:26 +01:00
k Wed Apr 17 20:35:48 UTC 2024 2024-04-17 23:41:21 +02:00
kde Tue Apr 16 21:57:56 UTC 2024 2024-04-17 00:28:26 +02:00
l Fri Apr 19 19:36:17 UTC 2024 2024-04-19 21:59:51 +02:00
n Fri Apr 19 19:36:17 UTC 2024 2024-04-19 21:59:51 +02:00
t Tue Apr 9 18:14:27 UTC 2024 2024-04-09 21:00:29 +02:00
tcl Fri Mar 1 22:13:28 UTC 2024 2024-03-02 00:36:00 +01:00
x Wed Apr 17 20:35:48 UTC 2024 2024-04-17 23:41:21 +02:00
xap Fri Apr 19 19:36:17 UTC 2024 2024-04-19 21:59:51 +02:00
xfce Wed Apr 17 20:35:48 UTC 2024 2024-04-17 23:41:21 +02:00
y Wed Mar 8 20:26:54 UTC 2023 2023-03-08 22:40:50 +01:00
buildlist-from-changelog.sh Fri Oct 8 03:23:28 UTC 2021 2021-10-08 08:59:45 +02:00
make_world.sh Wed Jun 8 19:15:34 UTC 2022 2022-06-09 07:00:13 +02:00
README.TXT Wed Feb 2 08:21:48 UTC 2022 2022-02-02 11:59:53 +01:00

This is the source used for Slackware.

To look for a particular bit of source (let's say for 'cp'), first you would
look for the full path:

fuzzy:~# which cp
/bin/cp

Then, you grep for the package it came from. Note that the leading '/'
is removed, and ^ and $ mark the beginning and end of the pattern to match:

fuzzy:~# grep ^bin/cp$ /var/lib/pkgtools/packages/*
/var/lib/pkgtools/packages/coreutils-9.0-x86_64-3:bin/cp

From this, you can see that 'cp' came from the coreutils-9.0-x86_64-3 package.
The source will be found in a corresponding subdirectory. In this case, that
would be ./a/coreutils/.

All of these packages have scripts that extract, patch, and compile the source
automatically. These are the 'SlackBuild' scripts.

Have fun!

---
Patrick J. Volkerding
volkerdi@slackware.com