The official slackware linux mirror (RU.Tomsk)
About
The mirror of daily syncing with slackware.mirrors.tds.net
Supported versions are 12.2 and higher (includes "current").
We have "slackbuilds" mirror here as well, see links below.

Mirror links
Both ftp & http(s) proto are support
http://slackware.tsu.ru/slackware/slackware-current
http://slackware.tsu.ru/slackware/slackware64-current
http://slackware.tsu.ru/slackware/slackware-VERSION
http://slackware.tsu.ru/slackware/slackware64-VERSION
http://slackware.tsu.ru/slackbuilds

Latest updates
  • slackware-12.2: Fri Oct 18 02:41:09 UTC 2013
  • slackware-13.37: Tue Jun 19 22:35:25 UTC 2018
  • slackware-14.2: Thu Jan 19 00:40:12 UTC 2023
  • slackware-15.0: Thu Jan 26 00:34:41 UTC 2023
  • slackware-current: Sun Jan 29 19:01:47 UTC 2023
  • slackware64-current: Sun Jan 29 19:01:47 UTC 2023

  • Helpful resources
    Official Slackware web http://slackware.com
    Official SlackBuilds repo http://slackbuilds.org

    Full ChangeLogs
    Slackware current
    Slackware64 current
    Slackware 15.0
    Slackware64 15.0
    Docs
    The SlackBook site (Eng)
    SlackBook 2 (Rus,PDF) 1.2Mb
    Slackware Documentation Project

    ISOs
    http://slackware.tsu.ru/slackware/slackware-iso
    http://slackware.tsu.ru/slackware/slackware-current-iso
    The ISO of the current version is available by email request. Feel free to email me.

    Contacts
    email: anatoly[at]box64.top
    Tail of the ChangeLogs
    15.0 (x86)

    Thu Jan 26 00:34:41 UTC 2023
    patches/packages/bind-9.16.37-i586-1_slack15.0.txz: Upgraded.
    This update fixes bugs and the following security issues:
    An UPDATE message flood could cause :iscman:`named` to exhaust all
    available memory. This flaw was addressed by adding a new
    :any:`update-quota` option that controls the maximum number of
    outstanding DNS UPDATE messages that :iscman:`named` can hold in a
    queue at any given time (default: 100).
    :iscman:`named` could crash with an assertion failure when an RRSIG
    query was received and :any:`stale-answer-client-timeout` was set to a
    non-zero value. This has been fixed.
    :iscman:`named` running as a resolver with the
    :any:`stale-answer-client-timeout` option set to any value greater
    than ``0`` could crash with an assertion failure, when the
    :any:`recursive-clients` soft quota was reached. This has been fixed.
    For more information, see:
    https://kb.isc.org/docs/cve-2022-3094
    https://kb.isc.org/docs/cve-2022-3736
    https://kb.isc.org/docs/cve-2022-3924
    https://www.cve.org/CVERecord?id=CVE-2022-3094
    https://www.cve.org/CVERecord?id=CVE-2022-3736
    https://www.cve.org/CVERecord?id=CVE-2022-3924
    (* Security fix *)
    patches/packages/vim-9.0.1241-i586-1_slack15.0.txz: Upgraded.
    Fixed a security issue:
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1225.
    Thanks to marav for the heads-up.
    For more information, see:
    https://www.cve.org/CVERecord?id=CVE-2023-0433
    (* Security fix *)
    patches/packages/vim-gvim-9.0.1241-i586-1_slack15.0.txz: Upgraded.
    testing/packages/bind-9.18.11-i586-1_slack15.0.txz: Upgraded.
    This update fixes bugs and the following security issues:
    An UPDATE message flood could cause :iscman:`named` to exhaust all
    available memory. This flaw was addressed by adding a new
    :any:`update-quota` option that controls the maximum number of
    outstanding DNS UPDATE messages that :iscman:`named` can hold in a
    queue at any given time (default: 100).
    :iscman:`named` could crash with an assertion failure when an RRSIG
    query was received and :any:`stale-answer-client-timeout` was set to a
    non-zero value. This has been fixed.
    :iscman:`named` running as a resolver with the
    :any:`stale-answer-client-timeout` option set to any value greater
    than ``0`` could crash with an assertion failure, when the
    :any:`recursive-clients` soft quota was reached. This has been fixed.
    For more information, see:
    https://kb.isc.org/docs/cve-2022-3094
    https://kb.isc.org/docs/cve-2022-3736
    https://kb.isc.org/docs/cve-2022-3924
    https://www.cve.org/CVERecord?id=CVE-2022-3094
    https://www.cve.org/CVERecord?id=CVE-2022-3736
    https://www.cve.org/CVERecord?id=CVE-2022-3924
    (* Security fix *)
    Current (x86)

    Sun Jan 29 19:01:47 UTC 2023
    l/imagemagick-7.1.0_59-i586-1.txz: Upgraded.
    n/c-ares-1.19.0-i586-1.txz: Upgraded.
    n/fetchmail-6.4.36-i586-1.txz: Upgraded.
    x/beforelight-1.0.6-i586-1.txz: Upgraded.
    Current (x86_64)

    Sun Jan 29 19:01:47 UTC 2023
    l/imagemagick-7.1.0_59-x86_64-1.txz: Upgraded.
    n/c-ares-1.19.0-x86_64-1.txz: Upgraded.
    n/fetchmail-6.4.36-x86_64-1.txz: Upgraded.
    x/beforelight-1.0.6-x86_64-1.txz: Upgraded.
    © Snelius (2006-2022). Hosted@TSUNet