The official slackware linux mirror (RU.Tomsk)
About
The mirror of daily syncing with slackware.mirrors.tds.net
Supported versions are 12.2 and higher (includes "current").
We have "slackbuilds" mirror here as well, see links below.

Mirror links
Both ftp & http(s) proto are support
http://slackware.tsu.ru/slackware/slackware-current
http://slackware.tsu.ru/slackware/slackware64-current
http://slackware.tsu.ru/slackware/slackware-VERSION
http://slackware.tsu.ru/slackware/slackware64-VERSION
http://slackware.tsu.ru/slackbuilds

Latest updates
  • slackware-12.2: Fri Oct 18 02:41:09 UTC 2013
  • slackware-13.37: Tue Jun 19 22:35:25 UTC 2018
  • slackware-14.2: Wed Nov 9 22:16:30 UTC 2022
  • slackware-15.0: Tue Nov 29 20:56:03 UTC 2022
  • slackware-current: Wed Nov 30 21:39:29 UTC 2022
  • slackware64-current: Wed Nov 30 21:39:29 UTC 2022

  • Helpful resources
    Official Slackware web http://slackware.com
    Official SlackBuilds repo http://slackbuilds.org

    Full ChangeLogs
    Slackware current
    Slackware64 current
    Slackware 15.0
    Slackware64 15.0
    Docs
    The SlackBook site (Eng)
    SlackBook 2 (Rus,PDF) 1.2Mb
    Slackware Documentation Project

    ISOs
    http://slackware.tsu.ru/slackware/slackware-iso
    http://slackware.tsu.ru/slackware/slackware-current-iso
    The ISO of the current version is available by email request. Feel free to email me.

    Contacts
    email: anatoly[at]box64.top
    Tail of the ChangeLogs
    15.0 (x86)

    Tue Nov 29 20:56:03 UTC 2022
    patches/packages/kernel-firmware-20221123_cdf9499-noarch-1.txz: Upgraded.
    patches/packages/linux-5.15.80/*: Upgraded.
    These updates fix various bugs and security issues.
    Be sure to upgrade your initrd after upgrading the kernel packages.
    If you use lilo to boot your machine, be sure lilo.conf points to the correct
    kernel and initrd and run lilo as root to update the bootloader.
    If you use elilo to boot your machine, you should run eliloconfig to copy the
    kernel and initrd to the EFI System Partition.
    For more information, see:
    Fixed in 5.15.63:
    https://www.cve.org/CVERecord?id=CVE-2022-3629
    https://www.cve.org/CVERecord?id=CVE-2022-3635
    https://www.cve.org/CVERecord?id=CVE-2022-3633
    https://www.cve.org/CVERecord?id=CVE-2022-3625
    Fixed in 5.15.64:
    https://www.cve.org/CVERecord?id=CVE-2022-39190
    https://www.cve.org/CVERecord?id=CVE-2022-3028
    https://www.cve.org/CVERecord?id=CVE-2022-2905
    Fixed in 5.15.65:
    https://www.cve.org/CVERecord?id=CVE-2022-42703
    https://www.cve.org/CVERecord?id=CVE-2022-3176
    Fixed in 5.15.66:
    https://www.cve.org/CVERecord?id=CVE-2022-4095
    https://www.cve.org/CVERecord?id=CVE-2022-20421
    Fixed in 5.15.68:
    https://www.cve.org/CVERecord?id=CVE-2022-3303
    https://www.cve.org/CVERecord?id=CVE-2022-2663
    https://www.cve.org/CVERecord?id=CVE-2022-40307
    https://www.cve.org/CVERecord?id=CVE-2022-3586
    Fixed in 5.15.70:
    https://www.cve.org/CVERecord?id=CVE-2022-0171
    https://www.cve.org/CVERecord?id=CVE-2022-39842
    https://www.cve.org/CVERecord?id=CVE-2022-3061
    Fixed in 5.15.72:
    https://www.cve.org/CVERecord?id=CVE-2022-2308
    Fixed in 5.15.73:
    https://www.cve.org/CVERecord?id=CVE-2022-2978
    https://www.cve.org/CVERecord?id=CVE-2022-43750
    Fixed in 5.15.74:
    https://www.cve.org/CVERecord?id=CVE-2022-40768
    https://www.cve.org/CVERecord?id=CVE-2022-42721
    https://www.cve.org/CVERecord?id=CVE-2022-3621
    https://www.cve.org/CVERecord?id=CVE-2022-42722
    https://www.cve.org/CVERecord?id=CVE-2022-42719
    https://www.cve.org/CVERecord?id=CVE-2022-41674
    https://www.cve.org/CVERecord?id=CVE-2022-3649
    https://www.cve.org/CVERecord?id=CVE-2022-3646
    https://www.cve.org/CVERecord?id=CVE-2022-42720
    Fixed in 5.15.75:
    https://www.cve.org/CVERecord?id=CVE-2022-43945
    https://www.cve.org/CVERecord?id=CVE-2022-41849
    https://www.cve.org/CVERecord?id=CVE-2022-3535
    https://www.cve.org/CVERecord?id=CVE-2022-3594
    https://www.cve.org/CVERecord?id=CVE-2022-2602
    https://www.cve.org/CVERecord?id=CVE-2022-41850
    https://www.cve.org/CVERecord?id=CVE-2022-3565
    https://www.cve.org/CVERecord?id=CVE-2022-3542
    Fixed in 5.15.77:
    https://www.cve.org/CVERecord?id=CVE-2022-3524
    Fixed in 5.15.78:
    https://www.cve.org/CVERecord?id=CVE-2022-3628
    https://www.cve.org/CVERecord?id=CVE-2022-3623
    https://www.cve.org/CVERecord?id=CVE-2022-42896
    https://www.cve.org/CVERecord?id=CVE-2022-42895
    https://www.cve.org/CVERecord?id=CVE-2022-3543
    https://www.cve.org/CVERecord?id=CVE-2022-3564
    https://www.cve.org/CVERecord?id=CVE-2022-3619
    Fixed in 5.15.80:
    https://www.cve.org/CVERecord?id=CVE-2022-3521
    https://www.cve.org/CVERecord?id=CVE-2022-3169
    (* Security fix *)
    patches/packages/openssl-1.1.1s-i586-1_slack15.0.txz: Upgraded.
    This is a bugfix release.
    patches/packages/openssl-solibs-1.1.1s-i586-1_slack15.0.txz: Upgraded.
    Current (x86)

    Wed Nov 30 21:39:29 UTC 2022
    kde/kstars-3.6.2-i586-1.txz: Upgraded.
    l/libbluray-1.3.4-i586-1.txz: Upgraded.
    l/newt-0.52.23-i586-1.txz: Upgraded.
    l/nodejs-19.2.0-i586-1.txz: Upgraded.
    x/wayland-protocols-1.31-noarch-1.txz: Upgraded.
    extra/php80/php80-8.0.26-i586-1.txz: Upgraded.
    extra/php81/php81-8.1.13-i586-1.txz: Upgraded.
    Current (x86_64)

    Wed Nov 30 21:39:29 UTC 2022
    kde/kstars-3.6.2-x86_64-1.txz: Upgraded.
    l/libbluray-1.3.4-x86_64-1.txz: Upgraded.
    l/newt-0.52.23-x86_64-1.txz: Upgraded.
    l/nodejs-19.2.0-x86_64-1.txz: Upgraded.
    x/wayland-protocols-1.31-noarch-1.txz: Upgraded.
    extra/php80/php80-8.0.26-x86_64-1.txz: Upgraded.
    extra/php81/php81-8.1.13-x86_64-1.txz: Upgraded.
    © Snelius (2006-2022). Hosted@TSUNet