Официальное зеркало Slackware в Томске
Описание
Официальный ресурс ежедневной синхронизации с slackware.mirrors.tds.net
Поддерживаемые версии: Current, 14.2, 14.1, 13.37, 13.1, 13.0, 12.2, 11.0.
Платформы x86 и x86_64.

Зеркала
ftp://slackware.tsu.ru/slackware/slackware-current
ftp://slackware.tsu.ru/slackware/slackware64-current
ftp://slackware.tsu.ru/slackware/slackware-14.2
ftp://slackware.tsu.ru/slackware/slackware64-14.2
ftp://slackware.tsu.ru/slackware/slackware-14.1
ftp://slackware.tsu.ru/slackware/slackware64-14.2
ftp://slackware.tsu.ru/slackware/slackware-13.37
ftp://slackware.tsu.ru/slackware/slackware64-13.37
ftp://slackware.tsu.ru/slackware/slackware-13.1
ftp://slackware.tsu.ru/slackware/slackware64-13.1
ftp://slackware.tsu.ru/slackware/slackware-13.0
ftp://slackware.tsu.ru/slackware/slackware64-13.0
ftp://slackware.tsu.ru/slackware/slackware-12.2
ftp://slackware.tsu.ru/slackware/slackware-11.0
ftp://slackware.tsu.ru/slackbuilds

Последние обновления
  • slackware-12.2: Fri Oct 18 02:41:09 UTC 2013
  • slackware-13.37: Fri Feb 10 21:07:35 UTC 2017
  • slackware-14.1: Fri Feb 10 21:07:35 UTC 2017
  • slackware-14.2: Fri Feb 10 21:07:35 UTC 2017
  • slackware-current: Mon Feb 13 06:21:22 UTC 2017
  • slackware64-current: Mon Feb 13 06:21:22 UTC 2017

  • Сетевые менеджеры пакетов
    slackpkg (Рекомендуемый)
    swaret 1.6.2 (Устаревший)
    slapt-get

    Ссылки
    Официальный сайт http://slackware.com
    Репозиторий дополнительного софта в виде SlackBuilds http://slackbuilds.org
    Журналы изменений
    Slackware current
    Slackware64 current
    Slackware 14.2
    Slackware 14.1
    Документация
    SlackBook 2 (rus,pdf) 1.2Mb

    DVD образы текущих версий
    ftp://slackware.tsu.ru/slackware/slackware-current-iso
    ftp://slackware.tsu.ru/slackware/slackware64-current-iso
    Делаются произвольно, либо по запросу на мыло или в рассылку.

    Контакты
    email: snelius[at]tsu.ru
    Последние записи в ChangeLog'ах
    14.2 (x86)

    Fri Feb 10 21:07:35 UTC 2017
    patches/packages/bind-9.10.4_P6-i586-1_slack14.2.txz: Upgraded.
    This update fixes a denial-of-service vulnerability. Under some conditions
    when using both DNS64 and RPZ to rewrite query responses, query processing
    can resume in an inconsistent state leading to either an INSIST assertion
    failure or an attempt to read through a NULL pointer.
    For more information, see:
    https://kb.isc.org/article/AA-01453
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3135
    (* Security fix *)
    patches/packages/libpcap-1.8.1-i586-1_slack14.2.txz: Upgraded.
    This update is required for the new version of tcpdump.
    patches/packages/mozilla-thunderbird-45.7.1-i586-1_slack14.2.txz: Upgraded.
    Fixed crash when viewing certain IMAP messages (introduced in 45.7.0)
    patches/packages/openssl-1.0.2k-i586-1_slack14.2.txz: Upgraded.
    This update fixes security issues:
    Truncated packet could crash via OOB read (CVE-2017-3731)
    BN_mod_exp may produce incorrect results on x86_64 (CVE-2017-3732)
    Montgomery multiplication may produce incorrect results (CVE-2016-7055)
    For more information, see:
    https://www.openssl.org/news/secadv/20170126.txt
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3732
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7055
    (* Security fix *)
    patches/packages/openssl-solibs-1.0.2k-i586-1_slack14.2.txz: Upgraded.
    patches/packages/php-5.6.30-i586-1_slack14.2.txz: Upgraded.
    This release fixes bugs and security issues.
    For more information, see:
    https://php.net/ChangeLog-5.php#5.6.30
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10158
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10159
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10160
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10161
    (* Security fix *)
    patches/packages/tcpdump-4.9.0-i586-1_slack14.2.txz: Upgraded.
    Fixed bugs which allow an attacker to crash tcpdump (denial of service).
    For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7922
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7923
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7924
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7925
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7926
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7927
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7928
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7929
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7930
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7931
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7932
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7933
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7934
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7935
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7936
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7937
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7938
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7939
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7940
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7973
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7974
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7975
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7983
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7984
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7985
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7986
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7992
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7993
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8574
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8575
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5202
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5203
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5204
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5205
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5341
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5342
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5482
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5483
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5484
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5485
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5486
    (* Security fix *)
    Current (x86)

    Mon Feb 13 06:21:22 UTC 2017
    a/grep-3.0-i586-1.txz: Upgraded.
    l/gst-plugins-libav-1.10.3-i586-1.txz: Added.
    Thanks to alienBOB.
    n/wget-1.19.1-i586-1.txz: Upgraded.
    Current (x86_64)

    Mon Feb 13 06:21:22 UTC 2017
    a/grep-3.0-x86_64-1.txz: Upgraded.
    l/gst-plugins-libav-1.10.3-x86_64-1.txz: Added.
    Thanks to alienBOB.
    n/wget-1.19.1-x86_64-1.txz: Upgraded.
    © Snelius (2006-2017). Hosted@TSUNet