The official slackware linux mirror (RU.Tomsk)
The mirror of daily syncing with
Supported versions are 11.0 and higher (includes "current").
In addition, we have "slackbuilds" mirror here, see links below.

Mirror links
Both ftp & http proto is supported

Latest updates
  • slackware-12.2: Fri Oct 18 02:41:09 UTC 2013
  • slackware-13.37: Tue Jun 19 22:35:25 UTC 2018
  • slackware-14.1: Sun Jan 16 21:33:27 UTC 2022
  • slackware-14.2: Wed Dec 29 02:42:32 UTC 2021
  • slackware-current: Sun Jan 16 21:33:27 UTC 2022
  • slackware64-current: Fri Jan 14 05:24:07 UTC 2022

  • Helpful resources
    Official Slackware web
    Official SlackBuilds repo

    Full ChangeLogs
    Slackware current
    Slackware64 current
    Slackware 14.2
    Slackware64 14.2
    The SlackBook site (Eng)
    SlackBook 2 (Rus,PDF) 1.2Mb

    The ISO of the current version is available by email request. Feel free to email me.

    email: iskhartakh[at]gmail
    Tail of the ChangeLogs
    14.2 (x86)

    Wed Dec 29 02:42:32 UTC 2021
    patches/packages/wpa_supplicant-2.9-i586-1_slack14.2.txz: Upgraded.
    This update fixes the following security issues:
    AP mode PMF disconnection protection bypass.
    UPnP SUBSCRIBE misbehavior in hostapd WPS AP.
    P2P group information processing vulnerability.
    P2P provision discovery processing vulnerability.
    ASN.1: Validate DigestAlgorithmIdentifier parameters.
    Flush pending control interface message for an interface to be removed.
    These issues could result in a denial-of-service, privilege escalation,
    arbitrary code execution, or other unexpected behavior.
    Thanks to nobodino for pointing out the patches.
    For more information, see:
    (* Security fix *)
    Current (x86)

    Sun Jan 16 21:33:27 UTC 2022
    a/aaa_libraries-15.0-i586-14.txz: Rebuilt.
    a/kernel-generic-5.15.15-i586-1.txz: Upgraded.
    a/kernel-generic-smp-5.15.15_smp-i686-1.txz: Upgraded.
    a/kernel-huge-5.15.15-i586-1.txz: Upgraded.
    a/kernel-huge-smp-5.15.15_smp-i686-1.txz: Upgraded.
    a/kernel-modules-5.15.15-i586-1.txz: Upgraded.
    a/kernel-modules-smp-5.15.15_smp-i686-1.txz: Upgraded.
    ap/cups-filters-1.28.11-i586-1.txz: Upgraded.
    ap/ksh93-1.0_20220114_e569f23e-i586-1.txz: Upgraded.
    ap/vim-8.2.4115-i586-1.txz: Upgraded.
    d/gdb-11.2-i586-1.txz: Upgraded.
    d/kernel-headers-5.15.15_smp-x86-1.txz: Upgraded.
    k/kernel-source-5.15.15_smp-noarch-1.txz: Upgraded.
    kde/kwayland-server-5.23.5-i586-2.txz: Rebuilt.
    Applied upstream patch:
    [PATCH] Store surface object in tablet cursor using QPointer.
    Thanks to ZhaoLin1457.
    l/expat-2.4.3-i586-1.txz: Upgraded.
    Fix issues with left shifts by >=29 places resulting in:
    a) realloc acting as free
    b) realloc allocating too few bytes
    c) undefined behavior
    Fix integer overflow on variable m_groupSize in function doProlog leading
    to realloc acting as free. Impact is denial of service or other undefined
    Prevent integer overflows near memory allocation at multiple places.
    For more information, see:
    (* Security fix *)
    l/libunwind-1.6.2-i586-1.txz: Upgraded.
    x/xterm-370-i586-3.txz: Rebuilt.
    Ship a sample XTerm.linux.console app-defaults file. Thanks to GazL.
    xap/vim-gvim-8.2.4115-i586-1.txz: Upgraded.
    xap/xsnow-3.4.3-i586-1.txz: Upgraded.
    extra/linux-5.15.15-nosmp-sdk/*: Upgraded.
    isolinux/initrd.img: Rebuilt.
    kernels/*: Upgraded.
    usb-and-pxe-installers/usbboot.img: Rebuilt.
    Current (x86_64)

    Fri Jan 14 05:24:07 UTC 2022
    a/cryptsetup-2.4.3-x86_64-1.txz: Upgraded.
    This update addresses a multi-step attack on LUKS2 format by orchestrating
    LUKS2 reencryption metadata in existing LUKS2 header. An attacker is able to
    trigger permanent data decryption (ciphertext->plaintext transformation) on
    part of data device on next LUKS2 device activation. Attacker does _not_
    have to know passphrase or decrypted volume encryption key.
    cryptsetup versions older than 2.2.0 are not affected by this, because they
    do not support online LUKS2 reencryption.
    For more information, see:
    (* Security fix *)
    © Snelius (2006-2021). Hosted@TSUNet