The official slackware linux mirror (RU.Tomsk)
About
The mirror of daily syncing with mirror.yandex.ru
Supported versions are 12.2 and higher (includes "current").
We have "slackbuilds" mirror here as well, see links below.

Mirror links
Both ftp & http(s) proto are support
http://slackware.tsu.ru/slackware/slackware-current
http://slackware.tsu.ru/slackware/slackware64-current
http://slackware.tsu.ru/slackware/slackware-VERSION
http://slackware.tsu.ru/slackware/slackware64-VERSION
http://slackware.tsu.ru/slackbuilds

Latest updates
  • slackware-12.2: Fri Oct 18 02:41:09 UTC 2013
  • slackware-13.37: Tue Jun 19 22:35:25 UTC 2018
  • slackware-14.2: Wed Jan 3 20:25:45 UTC 2024
  • slackware-15.0: Sat Apr 19 19:26:57 UTC 2025
  • slackware-current: Thu Apr 24 20:01:14 UTC 2025
  • slackware64-current: Thu Apr 24 20:01:14 UTC 2025

  • Helpful resources
    Official Slackware web http://slackware.com
    Official SlackBuilds repo http://slackbuilds.org

    Full ChangeLogs
    Slackware current
    Slackware64 current
    Slackware 15.0
    Slackware64 15.0
    Docs
    The SlackBook site (Eng)
    SlackBook 2 (Rus,PDF) 1.2Mb
    Slackware Documentation Project

    ISOs
    http://slackware.tsu.ru/slackware/slackware-iso
    http://slackware.tsu.ru/slackware/slackware-current-iso
    The ISO of the current version is available by email request. Feel free to email me.

    Contacts
    email: anatoly[at]box64.top
    Tail of the ChangeLogs
    15.0 (x86)

    Sat Apr 19 19:26:57 UTC 2025
    patches/packages/zsh-5.9-i586-1_slack15.0.txz: Upgraded.
    This release fixes a security issue in zsh-5.8:
    Some prompt expansion sequences, such as %F, support 'arguments' which are
    themselves expanded in case they contain colour values, etc. This additional
    expansion would trigger PROMPT_SUBST evaluation, if enabled. This could be
    abused to execute code the user didn't expect. e.g., given a certain prompt
    configuration, an attacker could trick a user into executing arbitrary code
    by having them check out a Git branch with a specially crafted name.
    This is fixed in the shell itself by no longer performing PROMPT_SUBST
    evaluation on these prompt-expansion arguments.
    Note that this is a potential incompatibilty if you are relying
    on the previous behavior of PROMPT_SUBST.
    Thanks to pblsxw for the heads-up on this.
    For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2021-45444
    (* Security fix *)
    Current (x86)

    Thu Apr 24 20:01:14 UTC 2025
    a/nut-2.8.3-i686-2.txz: Rebuilt.
    Removed dangling symlinks. Thanks to marav.
    a/pkgtools-15.1-noarch-29.txz: Rebuilt.
    upgradepkg: improve checking the return code from installpkg.
    Thanks to Petri Kaukasoina.
    a/utempter-1.2.3-i686-1.txz: Upgraded.
    d/python-setuptools-79.0.1-i686-1.txz: Upgraded.
    Current (x86_64)

    Thu Apr 24 20:01:14 UTC 2025
    a/nut-2.8.3-x86_64-2.txz: Rebuilt.
    Removed dangling symlinks. Thanks to marav.
    a/pkgtools-15.1-noarch-29.txz: Rebuilt.
    upgradepkg: improve checking the return code from installpkg.
    Thanks to Petri Kaukasoina.
    a/utempter-1.2.3-x86_64-1.txz: Upgraded.
    d/python-setuptools-79.0.1-x86_64-1.txz: Upgraded.
    © Snelius (2006-2025). Hosted@TSUNet