The official slackware linux mirror (RU.Tomsk)
About
The mirror of daily syncing with slackware.mirrors.tds.net
Supported versions are 11.0 and higher (includes "current").
In addition, we have "slackbuilds" mirror here, see links below.

Mirror links
Both ftp & http proto is supported
http://slackware.tsu.ru/slackware/slackware-current
http://slackware.tsu.ru/slackware/slackware64-current
http://slackware.tsu.ru/slackware/slackware-VERSION
http://slackware.tsu.ru/slackware/slackware64-VERSION
http://slackware.tsu.ru/slackbuilds

Latest updates
  • slackware-12.2: Fri Oct 18 02:41:09 UTC 2013
  • slackware-13.37: Tue Jun 19 22:35:25 UTC 2018
  • slackware-14.1: Fri Dec 3 20:07:20 UTC 2021
  • slackware-14.2: Fri Dec 3 20:07:20 UTC 2021
  • slackware-current: Sat Dec 4 20:31:55 UTC 2021
  • slackware64-current: Sat Dec 4 20:31:55 UTC 2021

  • Helpful resources
    Official Slackware web http://slackware.com
    Official SlackBuilds repo http://slackbuilds.org

    Full ChangeLogs
    Slackware current
    Slackware64 current
    Slackware 14.2
    Slackware64 14.2
    Docs
    The SlackBook site (Eng)
    SlackBook 2 (Rus,PDF) 1.2Mb

    ISOs
    http://slackware.tsu.ru/slackware/slackware-iso
    http://slackware.tsu.ru/slackware/slackware-current-iso
    The ISO of the current version is available by email request. Feel free to email me.

    Contacts
    email: iskhartakh[at]gmail
    Tail of the ChangeLogs
    14.2 (x86)

    Fri Dec 3 20:07:20 UTC 2021
    patches/packages/mozilla-nss-3.40.1-i586-2_slack14.2.txz: Rebuilt.
    This update fixes a critical security issue:
    NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are
    vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS
    signatures. Applications using NSS for handling signatures encoded within
    CMS, S/MIME, PKCS #7, or PKCS #12 are likely to be impacted. Applications
    using NSS for certificate validation or other TLS, X.509, OCSP or CRL
    functionality may be impacted, depending on how they configure NSS.
    Note: This vulnerability does NOT impact Mozilla Firefox. However, email
    clients and PDF viewers that use NSS for signature verification, such as
    Thunderbird, LibreOffice, Evolution and Evince are believed to be impacted.
    Thanks to Tavis Ormandy of Google Project Zero.
    For more information, see:
    https://www.mozilla.org/en-US/security/advisories/mfsa2021-51/
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527
    (* Security fix *)
    Current (x86)

    Sat Dec 4 20:31:55 UTC 2021
    a/hwdata-0.354-noarch-1.txz: Upgraded.
    a/sysklogd-2.3.0-i586-1.txz: Upgraded.
    kde/breeze-icons-5.88.0-noarch-2.txz: Rebuilt.
    Applied upstream patch:
    [PATCH] Install dark icons via execute_process to use copy command.
    Thanks to Heinz Wiesinger.
    l/netpbm-10.96.04-i586-1.txz: Upgraded.
    l/python-charset-normalizer-2.0.9-i586-1.txz: Upgraded.
    Current (x86_64)

    Sat Dec 4 20:31:55 UTC 2021
    a/hwdata-0.354-noarch-1.txz: Upgraded.
    a/sysklogd-2.3.0-x86_64-1.txz: Upgraded.
    kde/breeze-icons-5.88.0-noarch-2.txz: Rebuilt.
    Applied upstream patch:
    [PATCH] Install dark icons via execute_process to use copy command.
    Thanks to Heinz Wiesinger.
    l/netpbm-10.96.04-x86_64-1.txz: Upgraded.
    l/python-charset-normalizer-2.0.9-x86_64-1.txz: Upgraded.
    © Snelius (2006-2021). Hosted@TSUNet