slackware-current/source
Patrick J Volkerding 07449d94af Mon Sep 9 00:53:17 UTC 2024
a/kernel-generic-6.10.9-x86_64-1.txz:  Upgraded.
a/kernel-huge-6.10.9-x86_64-1.txz:  Upgraded.
a/kernel-modules-6.10.9-x86_64-1.txz:  Upgraded.
ap/texinfo-7.1.1-x86_64-1.txz:  Upgraded.
d/kernel-headers-6.10.9-x86-1.txz:  Upgraded.
d/python3-3.11.10-x86_64-1.txz:  Upgraded.
  This update fixes security issues:
  Bundled libexpat was updated to 2.6.3.
  Fix quadratic complexity in parsing "-quoted cookie values with backslashes
  by http.cookies.
  Fixed various false positives and false negatives in IPv4Address.is_private,
  IPv4Address.is_global, IPv6Address.is_private, IPv6Address.is_global.
  Fix urllib.parse.urlunparse() and urllib.parse.urlunsplit() for URIs with
  path starting with multiple slashes and no authority.
  Remove backtracking from tarfile header parsing for hdrcharset, PAX, and
  GNU sparse headers.
  email.utils.getaddresses() and email.utils.parseaddr() now return ('', '')
  2-tuples in more situations where invalid email addresses are encountered
  instead of potentially inaccurate values. Add optional strict parameter to
  these two functions: use strict=False to get the old behavior, accept
  malformed inputs. getattr(email.utils, 'supports_strict_parsing', False) can
  be used to check if the strict paramater is available.
  Sanitize names in zipfile.Path to avoid infinite loops (gh-122905) without
  breaking contents using legitimate characters.
  Email headers with embedded newlines are now quoted on output. The generator
  will now refuse to serialize (write) headers that are unsafely folded or
  delimited; see verify_generated_headers.
  For more information, see:
    https://pythoninsider.blogspot.com/2024/09/python-3130rc2-3126-31110-31015-3920.html
    https://www.cve.org/CVERecord?id=CVE-2024-28757
    https://www.cve.org/CVERecord?id=CVE-2024-45490
    https://www.cve.org/CVERecord?id=CVE-2024-45491
    https://www.cve.org/CVERecord?id=CVE-2024-45492
    https://www.cve.org/CVERecord?id=CVE-2024-7592
    https://www.cve.org/CVERecord?id=CVE-2024-4032
    https://www.cve.org/CVERecord?id=CVE-2015-2104
    https://www.cve.org/CVERecord?id=CVE-2024-6232
    https://www.cve.org/CVERecord?id=CVE-2023-27043
    https://www.cve.org/CVERecord?id=CVE-2024-8088
    https://www.cve.org/CVERecord?id=CVE-2024-6923
  (* Security fix *)
k/kernel-source-6.10.9-noarch-1.txz:  Upgraded.
   TEE n -> m
  +AMDTEE m
  +AMD_PMF m
  +AMD_PMF_DEBUG n
  Thanks to nick8325 for the suggestion.
l/qt5-5.15.15_20240903_363456a6-x86_64-1.txz:  Upgraded.
x/noto-emoji-2.042-noarch-1.txz:  Added.
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2024-09-09 04:00:54 +02:00
..
a Sat Sep 7 18:16:12 UTC 2024 2024-09-07 21:01:49 +02:00
ap Mon Sep 9 00:53:17 UTC 2024 2024-09-09 04:00:54 +02:00
d Mon Sep 9 00:53:17 UTC 2024 2024-09-09 04:00:54 +02:00
e Tue Jul 23 18:54:25 UTC 2024 2024-07-23 22:50:05 +02:00
f Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
installer Mon Jul 29 18:32:35 UTC 2024 2024-07-29 20:58:51 +02:00
k Mon Sep 9 00:53:17 UTC 2024 2024-09-09 04:00:54 +02:00
kde Mon Sep 2 19:56:17 UTC 2024 2024-09-02 22:40:20 +02:00
l Mon Sep 9 00:53:17 UTC 2024 2024-09-09 04:00:54 +02:00
n Thu Sep 5 22:14:23 UTC 2024 2024-09-06 01:14:21 +02:00
t Tue Apr 9 18:14:27 UTC 2024 2024-04-09 21:00:29 +02:00
tcl Sun May 12 19:10:12 UTC 2024 2024-05-12 21:28:58 +02:00
x Mon Sep 9 00:53:17 UTC 2024 2024-09-09 04:00:54 +02:00
xap Tue Sep 3 21:07:09 UTC 2024 2024-09-04 00:33:23 +02:00
xfce Tue Aug 20 18:23:52 UTC 2024 2024-08-20 20:59:42 +02:00
y Sun May 12 19:10:12 UTC 2024 2024-05-12 21:28:58 +02:00
buildlist-from-changelog.sh Fri Oct 8 03:23:28 UTC 2021 2021-10-08 08:59:45 +02:00
make_world.sh Wed Jun 8 19:15:34 UTC 2022 2022-06-09 07:00:13 +02:00
README.TXT Wed Feb 2 08:21:48 UTC 2022 2022-02-02 11:59:53 +01:00

This is the source used for Slackware.

To look for a particular bit of source (let's say for 'cp'), first you would
look for the full path:

fuzzy:~# which cp
/bin/cp

Then, you grep for the package it came from. Note that the leading '/'
is removed, and ^ and $ mark the beginning and end of the pattern to match:

fuzzy:~# grep ^bin/cp$ /var/lib/pkgtools/packages/*
/var/lib/pkgtools/packages/coreutils-9.0-x86_64-3:bin/cp

From this, you can see that 'cp' came from the coreutils-9.0-x86_64-3 package.
The source will be found in a corresponding subdirectory. In this case, that
would be ./a/coreutils/.

All of these packages have scripts that extract, patch, and compile the source
automatically. These are the 'SlackBuild' scripts.

Have fun!

---
Patrick J. Volkerding
volkerdi@slackware.com