The official slackware linux mirror (RU.Tomsk)
About
The mirror to daily syncing with slackware.mirrors.tds.net
Supported versions is 11.0 and higher. The "current" branch included.
In additional we have "slackbuilds" mirror here, see links below.

Mirror links
Both ftp & http proto supported
http://slackware.tsu.ru/slackware/slackware-current
http://slackware.tsu.ru/slackware/slackware64-current
http://slackware.tsu.ru/slackware/slackware-VERSION
http://slackware.tsu.ru/slackware/slackware64-VERSION
http://slackware.tsu.ru/slackbuilds

Latest updates
  • slackware-12.2: Fri Oct 18 02:41:09 UTC 2013
  • slackware-13.37: Tue Jun 19 22:35:25 UTC 2018
  • slackware-14.1: Tue Jun 18 21:46:31 UTC 2019
  • slackware-14.2: Tue Jun 18 21:46:31 UTC 2019
  • slackware-current: Tue Jun 18 21:46:31 UTC 2019
  • slackware64-current: Tue Jun 18 21:46:31 UTC 2019

  • Helpful resources
    Official Slackware web http://slackware.com
    Official SlackBuilds repo http://slackbuilds.org

    Full ChangeLog links of latest
    Slackware current
    Slackware64 current
    Slackware 14.2
    Slackware64 14.2
    Docs
    The SlackBook site (Eng)
    SlackBook 2 (Rus,PDF) 1.2Mb

    ISOs
    http://slackware.tsu.ru/slackware/slackware-iso
    http://slackware.tsu.ru/slackware/slackware-current-iso
    The current ISOs builds as requested. Feel free to mail me.

    Contacts
    email: snelius[at]tsu.ru
    Tail of the ChangeLogs
    14.2 (x86)

    Tue Jun 18 21:46:31 UTC 2019
    patches/packages/ca-certificates-20190617-noarch-1_slack14.2.txz: Upgraded.
    This update provides the latest CA certificates to check for the
    authenticity of SSL connections.
    patches/packages/linux-4.4.182/*: Upgraded.
    These updates fix various bugs and many security issues, including the
    "SACK Panic" remote denial-of-service issue.
    Be sure to upgrade your initrd after upgrading the kernel packages.
    If you use lilo to boot your machine, be sure lilo.conf points to the correct
    kernel and initrd and run lilo as root to update the bootloader.
    If you use elilo to boot your machine, you should run eliloconfig to copy the
    kernel and initrd to the EFI System Partition.
    For more information, see:
    Fixed in 4.4.174:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5391
    Fixed in 4.4.175:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7222
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7221
    Fixed in 4.4.176:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6974
    Fixed in 4.4.177:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9213
    Fixed in 4.4.178:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3459
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3460
    Fixed in 4.4.179:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11810
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11190
    Fixed in 4.4.180:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884
    Fixed in 4.4.181:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20510
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000026
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503
    Fixed in 4.4.182:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479
    (* Security fix *)
    patches/packages/mozilla-firefox-60.7.1esr-i686-1_slack14.2.txz: Upgraded.
    This release contains a security fix and improvements. The patched flaw is
    considered critical, and could be used to run attacker code and install
    software, requiring no user interaction beyond normal browsing.
    For more information, see:
    https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
    https://www.mozilla.org/en-US/security/advisories/mfsa2019-18/
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11707
    (* Security fix *)
    Current (x86)

    Tue Jun 18 21:46:31 UTC 2019
    a/kernel-firmware-20190618_acb56f2-noarch-1.txz: Upgraded.
    a/kernel-generic-4.19.52-i586-1.txz: Upgraded.
    a/kernel-generic-smp-4.19.52_smp-i686-1.txz: Upgraded.
    a/kernel-huge-4.19.52-i586-1.txz: Upgraded.
    a/kernel-huge-smp-4.19.52_smp-i686-1.txz: Upgraded.
    a/kernel-modules-4.19.52-i586-1.txz: Upgraded.
    a/kernel-modules-smp-4.19.52_smp-i686-1.txz: Upgraded.
    ap/mariadb-10.3.16-i586-1.txz: Upgraded.
    ap/nano-4.3-i586-1.txz: Upgraded.
    d/kernel-headers-4.19.52_smp-x86-1.txz: Upgraded.
    d/llvm-8.0.0-i586-3.txz: Rebuilt.
    Added lld-8.0.0. Thanks to TheRealGrogan.
    d/meson-0.51.0-i586-1.txz: Upgraded.
    d/vala-0.44.5-i586-1.txz: Upgraded.
    k/kernel-source-4.19.52_smp-noarch-1.txz: Upgraded.
    This update fixes "SACK Panic", a remote denial-of-service issue.
    For more information, see:
    https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479
    (* Security fix *)
    l/SDL2-2.0.9-i586-4.txz: Rebuilt.
    Include libSDL2_test.a and libSDL2main.a. Thanks to dugan.
    l/gtk+3-3.24.9-i586-1.txz: Upgraded.
    n/ca-certificates-20190617-noarch-1.txz: Upgraded.
    x/encodings-1.0.5-noarch-1.txz: Upgraded.
    x/libX11-1.6.8-i586-1.txz: Upgraded.
    xap/mozilla-firefox-60.7.1esr-i686-1.txz: Upgraded.
    This release contains a security fix and improvements. The patched flaw is
    considered critical, and could be used to run attacker code and install
    software, requiring no user interaction beyond normal browsing.
    For more information, see:
    https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
    https://www.mozilla.org/en-US/security/advisories/mfsa2019-18/
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11707
    (* Security fix *)
    extra/linux-4.19.52-nosmp-sdk/*: Upgraded.
    isolinux/initrd.img: Rebuilt.
    kernels/*: Upgraded.
    usb-and-pxe-installers/usbboot.img: Rebuilt.
    Current (x86_64)

    Tue Jun 18 21:46:31 UTC 2019
    a/kernel-firmware-20190618_acb56f2-noarch-1.txz: Upgraded.
    a/kernel-generic-4.19.52-x86_64-1.txz: Upgraded.
    a/kernel-huge-4.19.52-x86_64-1.txz: Upgraded.
    a/kernel-modules-4.19.52-x86_64-1.txz: Upgraded.
    ap/mariadb-10.3.16-x86_64-1.txz: Upgraded.
    ap/nano-4.3-x86_64-1.txz: Upgraded.
    d/kernel-headers-4.19.52-x86-1.txz: Upgraded.
    d/llvm-8.0.0-x86_64-3.txz: Rebuilt.
    Added lld-8.0.0. Thanks to TheRealGrogan.
    d/meson-0.51.0-x86_64-1.txz: Upgraded.
    d/vala-0.44.5-x86_64-1.txz: Upgraded.
    k/kernel-source-4.19.52-noarch-1.txz: Upgraded.
    This update fixes "SACK Panic", a remote denial-of-service issue.
    For more information, see:
    https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479
    (* Security fix *)
    l/SDL2-2.0.9-x86_64-4.txz: Rebuilt.
    Include libSDL2_test.a and libSDL2main.a. Thanks to dugan.
    l/gtk+3-3.24.9-x86_64-1.txz: Upgraded.
    n/ca-certificates-20190617-noarch-1.txz: Upgraded.
    x/encodings-1.0.5-noarch-1.txz: Upgraded.
    x/libX11-1.6.8-x86_64-1.txz: Upgraded.
    xap/mozilla-firefox-60.7.1esr-x86_64-1.txz: Upgraded.
    This release contains a security fix and improvements. The patched flaw is
    considered critical, and could be used to run attacker code and install
    software, requiring no user interaction beyond normal browsing.
    For more information, see:
    https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
    https://www.mozilla.org/en-US/security/advisories/mfsa2019-18/
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11707
    (* Security fix *)
    isolinux/initrd.img: Rebuilt.
    kernels/*: Upgraded.
    usb-and-pxe-installers/usbboot.img: Rebuilt.
    © Snelius (2006-2018). Hosted@TSUNet