The official slackware linux mirror (RU.Tomsk)
About
The mirror of daily syncing with slackware.mirrors.tds.net
Supported versions are 11.0 and higher (includes "current").
In addition, we have "slackbuilds" mirror here, see links below.

Mirror links
Both ftp & http proto is supported
http://slackware.tsu.ru/slackware/slackware-current
http://slackware.tsu.ru/slackware/slackware64-current
http://slackware.tsu.ru/slackware/slackware-VERSION
http://slackware.tsu.ru/slackware/slackware64-VERSION
http://slackware.tsu.ru/slackbuilds

Latest updates
  • slackware-12.2: Fri Oct 18 02:41:09 UTC 2013
  • slackware-13.37: Tue Jun 19 22:35:25 UTC 2018
  • slackware-14.1: Sun Jan 16 21:33:27 UTC 2022
  • slackware-14.2: Wed Dec 29 02:42:32 UTC 2021
  • slackware-current: Sun Jan 16 21:33:27 UTC 2022
  • slackware64-current: Fri Jan 14 05:24:07 UTC 2022

  • Helpful resources
    Official Slackware web http://slackware.com
    Official SlackBuilds repo http://slackbuilds.org

    Full ChangeLogs
    Slackware current
    Slackware64 current
    Slackware 14.2
    Slackware64 14.2
    Docs
    The SlackBook site (Eng)
    SlackBook 2 (Rus,PDF) 1.2Mb

    ISOs
    http://slackware.tsu.ru/slackware/slackware-iso
    http://slackware.tsu.ru/slackware/slackware-current-iso
    The ISO of the current version is available by email request. Feel free to email me.

    Contacts
    email: iskhartakh[at]gmail
    Tail of the ChangeLogs
    14.2 (x86)

    Wed Dec 29 02:42:32 UTC 2021
    patches/packages/wpa_supplicant-2.9-i586-1_slack14.2.txz: Upgraded.
    This update fixes the following security issues:
    AP mode PMF disconnection protection bypass.
    UPnP SUBSCRIBE misbehavior in hostapd WPS AP.
    P2P group information processing vulnerability.
    P2P provision discovery processing vulnerability.
    ASN.1: Validate DigestAlgorithmIdentifier parameters.
    Flush pending control interface message for an interface to be removed.
    These issues could result in a denial-of-service, privilege escalation,
    arbitrary code execution, or other unexpected behavior.
    Thanks to nobodino for pointing out the patches.
    For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0326
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0535
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12695
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16275
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27803
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30004
    (* Security fix *)
    Current (x86)

    Sun Jan 16 21:33:27 UTC 2022
    a/aaa_libraries-15.0-i586-14.txz: Rebuilt.
    Upgraded: libexpat.so.1.8.3.
    a/kernel-generic-5.15.15-i586-1.txz: Upgraded.
    a/kernel-generic-smp-5.15.15_smp-i686-1.txz: Upgraded.
    a/kernel-huge-5.15.15-i586-1.txz: Upgraded.
    a/kernel-huge-smp-5.15.15_smp-i686-1.txz: Upgraded.
    a/kernel-modules-5.15.15-i586-1.txz: Upgraded.
    a/kernel-modules-smp-5.15.15_smp-i686-1.txz: Upgraded.
    ap/cups-filters-1.28.11-i586-1.txz: Upgraded.
    ap/ksh93-1.0_20220114_e569f23e-i586-1.txz: Upgraded.
    ap/vim-8.2.4115-i586-1.txz: Upgraded.
    d/gdb-11.2-i586-1.txz: Upgraded.
    d/kernel-headers-5.15.15_smp-x86-1.txz: Upgraded.
    k/kernel-source-5.15.15_smp-noarch-1.txz: Upgraded.
    kde/kwayland-server-5.23.5-i586-2.txz: Rebuilt.
    Applied upstream patch:
    [PATCH] Store surface object in tablet cursor using QPointer.
    Thanks to ZhaoLin1457.
    l/expat-2.4.3-i586-1.txz: Upgraded.
    Fix issues with left shifts by >=29 places resulting in:
    a) realloc acting as free
    b) realloc allocating too few bytes
    c) undefined behavior
    Fix integer overflow on variable m_groupSize in function doProlog leading
    to realloc acting as free. Impact is denial of service or other undefined
    behavior.
    Prevent integer overflows near memory allocation at multiple places.
    For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827
    (* Security fix *)
    l/libunwind-1.6.2-i586-1.txz: Upgraded.
    x/xterm-370-i586-3.txz: Rebuilt.
    Ship a sample XTerm.linux.console app-defaults file. Thanks to GazL.
    xap/vim-gvim-8.2.4115-i586-1.txz: Upgraded.
    xap/xsnow-3.4.3-i586-1.txz: Upgraded.
    extra/linux-5.15.15-nosmp-sdk/*: Upgraded.
    isolinux/initrd.img: Rebuilt.
    kernels/*: Upgraded.
    usb-and-pxe-installers/usbboot.img: Rebuilt.
    Current (x86_64)

    Fri Jan 14 05:24:07 UTC 2022
    a/cryptsetup-2.4.3-x86_64-1.txz: Upgraded.
    This update addresses a multi-step attack on LUKS2 format by orchestrating
    LUKS2 reencryption metadata in existing LUKS2 header. An attacker is able to
    trigger permanent data decryption (ciphertext->plaintext transformation) on
    part of data device on next LUKS2 device activation. Attacker does _not_
    have to know passphrase or decrypted volume encryption key.
    cryptsetup versions older than 2.2.0 are not affected by this, because they
    do not support online LUKS2 reencryption.
    For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4122
    (* Security fix *)
    © Snelius (2006-2021). Hosted@TSUNet