The official slackware linux mirror (RU.Tomsk)
About
The mirror of daily syncing with slackware.mirrors.tds.net
Supported versions are 12.2 and higher (includes "current").
We have "slackbuilds" mirror here as well, see links below.

Mirror links
Both ftp & http(s) proto are support
http://slackware.tsu.ru/slackware/slackware-current
http://slackware.tsu.ru/slackware/slackware64-current
http://slackware.tsu.ru/slackware/slackware-VERSION
http://slackware.tsu.ru/slackware/slackware64-VERSION
http://slackware.tsu.ru/slackbuilds

Latest updates
  • slackware-12.2: Fri Oct 18 02:41:09 UTC 2013
  • slackware-13.37: Tue Jun 19 22:35:25 UTC 2018
  • slackware-14.2: Thu Jun 23 05:30:51 UTC 2022
  • slackware-15.0: Thu Jun 23 05:30:51 UTC 2022
  • slackware-current: Thu Jun 23 18:15:29 UTC 2022
  • slackware64-current: Thu Jun 23 18:15:29 UTC 2022

  • Helpful resources
    Official Slackware web http://slackware.com
    Official SlackBuilds repo http://slackbuilds.org

    Full ChangeLogs
    Slackware current
    Slackware64 current
    Slackware 15.0
    Slackware64 15.0
    Docs
    The SlackBook site (Eng)
    SlackBook 2 (Rus,PDF) 1.2Mb
    Slackware Documentation Project

    ISOs
    http://slackware.tsu.ru/slackware/slackware-iso
    http://slackware.tsu.ru/slackware/slackware-current-iso
    The ISO of the current version is available by email request. Feel free to email me.

    Contacts
    email: anatoly[at]box64.top
    Tail of the ChangeLogs
    15.0 (x86)

    Thu Jun 23 05:30:51 UTC 2022
    patches/packages/ca-certificates-20220622-noarch-1_slack15.0.txz: Upgraded.
    This update provides the latest CA certificates to check for the
    authenticity of SSL connections.
    patches/packages/openssl-1.1.1p-i586-1_slack15.0.txz: Upgraded.
    In addition to the c_rehash shell command injection identified in
    CVE-2022-1292, further circumstances where the c_rehash script does not
    properly sanitise shell metacharacters to prevent command injection were
    found by code review.
    When the CVE-2022-1292 was fixed it was not discovered that there
    are other places in the script where the file names of certificates
    being hashed were possibly passed to a command executed through the shell.
    For more information, see:
    https://www.openssl.org/news/secadv/20220621.txt
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068
    (* Security fix *)
    patches/packages/openssl-solibs-1.1.1p-i586-1_slack15.0.txz: Upgraded.
    Current (x86)

    Thu Jun 23 18:15:29 UTC 2022
    d/parallel-20220622-noarch-1.txz: Upgraded.
    kde/digikam-7.7.0-i586-1.txz: Upgraded.
    Current (x86_64)

    Thu Jun 23 18:15:29 UTC 2022
    d/parallel-20220622-noarch-1.txz: Upgraded.
    kde/digikam-7.7.0-x86_64-1.txz: Upgraded.
    © Snelius (2006-2022). Hosted@TSUNet