1
0
Fork 0
mirror of git://slackware.nl/current.git synced 2025-02-11 08:48:30 +01:00
slackware-current/source
Patrick J Volkerding 39f1d1796b Tue Jan 14 23:53:04 UTC 2025
a/lzlib-1.15-x86_64-1.txz:  Upgraded.
a/plzip-1.12-x86_64-1.txz:  Upgraded.
d/llvm-19.1.7-x86_64-1.txz:  Upgraded.
l/libqalculate-5.5.0-x86_64-1.txz:  Upgraded.
n/gnupg2-2.5.3-x86_64-1.txz:  Upgraded.
n/rsync-3.4.0-x86_64-1.txz:  Upgraded.
  This is a security release, fixing several important security vulnerabilities:
  Heap Buffer Overflow in Checksum Parsing.
  Info Leak via uninitialized Stack contents defeats ASLR.
  Server leaks arbitrary client files.
  Server can make client write files outside of destination directory using symbolic links.
  --safe-links Bypass.
  Symlink race condition.
  Many thanks to Simon Scannell, Pedro Gallegos, and Jasiel Spelman at
  Google Cloud Vulnerability Research and Aleksei Gorban (Loqpa) for
  discovering these vulnerabilities and working with the rsync project
  to develop and test fixes.
  For more information, see:
    https://kb.cert.org/vuls/id/952657
    https://www.cve.org/CVERecord?id=CVE-2024-12084
    https://www.cve.org/CVERecord?id=CVE-2024-12085
    https://www.cve.org/CVERecord?id=CVE-2024-12086
    https://www.cve.org/CVERecord?id=CVE-2024-12087
    https://www.cve.org/CVERecord?id=CVE-2024-12088
    https://www.cve.org/CVERecord?id=CVE-2024-12747
  (* Security fix *)
xap/qalculate-gtk-5.5.0-x86_64-1.txz:  Upgraded.
xap/qalculate-qt-5.5.0-x86_64-1.txz:  Upgraded.
2025-01-15 01:55:25 +01:00
..
a Tue Jan 14 23:53:04 UTC 2025 2025-01-15 01:55:25 +01:00
ap Wed Jan 8 23:26:27 UTC 2025 2025-01-09 01:30:01 +01:00
d Tue Jan 14 23:53:04 UTC 2025 2025-01-15 01:55:25 +01:00
e Tue Jul 23 18:54:25 UTC 2024 2024-07-23 22:50:05 +02:00
f Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
installer Fri Dec 27 23:07:45 UTC 2024 2024-12-28 01:14:53 +01:00
k Thu Jan 9 22:08:05 UTC 2025 2025-01-10 00:08:54 +01:00
kde Thu Jan 9 22:08:05 UTC 2025 2025-01-10 00:08:54 +01:00
l Mon Jan 13 23:57:44 UTC 2025 2025-01-14 01:31:34 +01:00
n Tue Jan 14 23:53:04 UTC 2025 2025-01-15 01:55:25 +01:00
t Tue Dec 31 19:47:47 UTC 2024 2024-12-31 21:29:46 +01:00
tcl Thu Dec 5 22:00:02 UTC 2024 2024-12-05 23:45:17 +01:00
x Mon Jan 6 21:56:39 UTC 2025 2025-01-06 23:36:32 +01:00
xap Sat Jan 11 22:49:38 UTC 2025 2025-01-12 00:38:52 +01:00
xfce Sat Jan 4 18:40:17 UTC 2025 2025-01-04 20:07:33 +01:00
y Mon Dec 23 23:43:54 UTC 2024 2024-12-24 01:04:05 +01:00
buildlist-from-changelog.sh Fri Oct 8 03:23:28 UTC 2021 2021-10-08 08:59:45 +02:00
make_world.sh Wed Jun 8 19:15:34 UTC 2022 2022-06-09 07:00:13 +02:00
README.TXT Wed Feb 2 08:21:48 UTC 2022 2022-02-02 11:59:53 +01:00

This is the source used for Slackware.

To look for a particular bit of source (let's say for 'cp'), first you would
look for the full path:

fuzzy:~# which cp
/bin/cp

Then, you grep for the package it came from. Note that the leading '/'
is removed, and ^ and $ mark the beginning and end of the pattern to match:

fuzzy:~# grep ^bin/cp$ /var/lib/pkgtools/packages/*
/var/lib/pkgtools/packages/coreutils-9.0-x86_64-3:bin/cp

From this, you can see that 'cp' came from the coreutils-9.0-x86_64-3 package.
The source will be found in a corresponding subdirectory. In this case, that
would be ./a/coreutils/.

All of these packages have scripts that extract, patch, and compile the source
automatically. These are the 'SlackBuild' scripts.

Have fun!

---
Patrick J. Volkerding
volkerdi@slackware.com