Официальное зеркало Slackware в Томске
Описание
Официальный ресурс ежедневной синхронизации с slackware.mirrors.tds.net
Поддерживаемые версии: Current, 14.2, 14.1, 13.37, 13.1, 13.0, 12.2, 11.0.
Платформы x86 и x86_64.

Зеркала
ftp://slackware.tsu.ru/slackware/slackware-current
ftp://slackware.tsu.ru/slackware/slackware64-current
ftp://slackware.tsu.ru/slackware/slackware-14.2
ftp://slackware.tsu.ru/slackware/slackware64-14.2
ftp://slackware.tsu.ru/slackware/slackware-14.1
ftp://slackware.tsu.ru/slackware/slackware64-14.2
ftp://slackware.tsu.ru/slackware/slackware-13.37
ftp://slackware.tsu.ru/slackware/slackware64-13.37
ftp://slackware.tsu.ru/slackware/slackware-13.1
ftp://slackware.tsu.ru/slackware/slackware64-13.1
ftp://slackware.tsu.ru/slackware/slackware-13.0
ftp://slackware.tsu.ru/slackware/slackware64-13.0
ftp://slackware.tsu.ru/slackware/slackware-12.2
ftp://slackware.tsu.ru/slackware/slackware-11.0
ftp://slackware.tsu.ru/slackbuilds

Последние обновления
  • slackware-12.2: Fri Oct 18 02:41:09 UTC 2013
  • slackware-13.37: Mon Oct 2 17:16:06 UTC 2017
  • slackware-14.1: Wed Oct 18 18:21:18 UTC 2017
  • slackware-14.2: Wed Oct 18 18:21:18 UTC 2017
  • slackware-current: Fri Oct 20 04:44:44 UTC 2017
  • slackware64-current: Fri Oct 20 04:44:44 UTC 2017

  • Сетевые менеджеры пакетов
    slackpkg (Рекомендуемый)
    swaret 1.6.2 (Устаревший)
    slapt-get

    Ссылки
    Официальный сайт http://slackware.com
    Репозиторий дополнительного софта в виде SlackBuilds http://slackbuilds.org
    Журналы изменений
    Slackware current
    Slackware64 current
    Slackware 14.2
    Slackware 14.1
    Документация
    SlackBook 2 (rus,pdf) 1.2Mb

    DVD образы текущих версий
    ftp://slackware.tsu.ru/slackware/slackware-current-iso
    ftp://slackware.tsu.ru/slackware/slackware64-current-iso
    Делаются произвольно, либо по запросу на мыло или в рассылку.

    Контакты
    email: snelius[at]tsu.ru
    Последние записи в ChangeLog'ах
    14.2 (x86)

    Wed Oct 18 18:21:18 UTC 2017
    patches/packages/libXres-1.2.0-i586-1_slack14.2.txz: Upgraded.
    Integer overflows may allow X servers to trigger allocation of insufficient
    memory and a buffer overflow via vectors related to the (1)
    XResQueryClients and (2) XResQueryClientResources functions.
    For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1988
    (* Security fix *)
    patches/packages/wpa_supplicant-2.6-i586-1_slack14.2.txz: Upgraded.
    This update includes patches to mitigate the WPA2 protocol issues known
    as "KRACK" (Key Reinstallation AttaCK), which may be used to decrypt data,
    hijack TCP connections, and to forge and inject packets. This is the
    list of vulnerabilities that are addressed here:
    CVE-2017-13077: Reinstallation of the pairwise encryption key (PTK-TK) in the
    4-way handshake.
    CVE-2017-13078: Reinstallation of the group key (GTK) in the 4-way handshake.
    CVE-2017-13079: Reinstallation of the integrity group key (IGTK) in the 4-way
    handshake.
    CVE-2017-13080: Reinstallation of the group key (GTK) in the group key
    handshake.
    CVE-2017-13081: Reinstallation of the integrity group key (IGTK) in the group
    key handshake.
    CVE-2017-13082: Accepting a retransmitted Fast BSS Transition (FT)
    Reassociation Request and reinstalling the pairwise encryption key (PTK-TK)
    while processing it.
    CVE-2017-13084: Reinstallation of the STK key in the PeerKey handshake.
    CVE-2017-13086: reinstallation of the Tunneled Direct-Link Setup (TDLS)
    PeerKey (TPK) key in the TDLS handshake.
    CVE-2017-13087: reinstallation of the group key (GTK) when processing a
    Wireless Network Management (WNM) Sleep Mode Response frame.
    CVE-2017-13088: reinstallation of the integrity group key (IGTK) when
    processing a Wireless Network Management (WNM) Sleep Mode Response frame.
    For more information, see:
    https://www.krackattacks.com/
    https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13077
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13078
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13079
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13081
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13082
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13084
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13086
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13087
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13088
    (* Security fix *)
    patches/packages/xorg-server-1.18.3-i586-5_slack14.2.txz: Rebuilt.
    This update fixes integer overflows and other possible security issues.
    For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12176
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12177
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12178
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12179
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12180
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12181
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12182
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12183
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12184
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12185
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12186
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12187
    (* Security fix *)
    patches/packages/xorg-server-xephyr-1.18.3-i586-5_slack14.2.txz: Rebuilt.
    patches/packages/xorg-server-xnest-1.18.3-i586-5_slack14.2.txz: Rebuilt.
    patches/packages/xorg-server-xvfb-1.18.3-i586-5_slack14.2.txz: Rebuilt.
    Current (x86)

    Fri Oct 20 04:44:44 UTC 2017
    a/gawk-4.2.0-i586-1.txz: Upgraded.
    d/patchelf-0.9-i586-1.txz: Added.
    d/rust-1.21.0-i686-1.txz: Upgraded.
    Thanks to Stuart Winter for adding ARM compatibility to the build script, and
    to Andrew Clemons for help getting the 32-bit x86 build working again.
    l/ffmpeg-3.4-i586-1.txz: Upgraded.
    x/libdrm-2.4.84-i586-1.txz: Upgraded.
    x/mesa-17.2.3-i586-1.txz: Upgraded.
    Current (x86_64)

    Fri Oct 20 04:44:44 UTC 2017
    a/gawk-4.2.0-x86_64-1.txz: Upgraded.
    d/patchelf-0.9-x86_64-1.txz: Added.
    d/rust-1.21.0-x86_64-1.txz: Upgraded.
    Thanks to Stuart Winter for adding ARM compatibility to the build script, and
    to Andrew Clemons for help getting the 32-bit x86 build working again.
    l/ffmpeg-3.4-x86_64-1.txz: Upgraded.
    x/libdrm-2.4.84-x86_64-1.txz: Upgraded.
    x/mesa-17.2.3-x86_64-1.txz: Upgraded.
    © Snelius (2006-2017). Hosted@TSUNet