The official slackware linux mirror (RU.Tomsk)
About
The mirror of daily syncing with slackware.mirrors.tds.net
Supported versions are 11.0 and higher (includes "current").
In addition, we have "slackbuilds" mirror here, see links below.

Mirror links
Both ftp & http proto is supported
http://slackware.tsu.ru/slackware/slackware-current
http://slackware.tsu.ru/slackware/slackware64-current
http://slackware.tsu.ru/slackware/slackware-VERSION
http://slackware.tsu.ru/slackware/slackware64-VERSION
http://slackware.tsu.ru/slackbuilds

Latest updates
  • slackware-12.2: Fri Oct 18 02:41:09 UTC 2013
  • slackware-13.37: Tue Jun 19 22:35:25 UTC 2018
  • slackware-14.1: Mon Jun 7 18:53:49 UTC 2021
  • slackware-14.2: Mon Jun 7 18:53:49 UTC 2021
  • slackware-current: Fri Jun 18 20:33:08 UTC 2021
  • slackware64-current: Fri Jun 18 20:33:08 UTC 2021

  • Helpful resources
    Official Slackware web http://slackware.com
    Official SlackBuilds repo http://slackbuilds.org

    Full ChangeLogs
    Slackware current
    Slackware64 current
    Slackware 14.2
    Slackware64 14.2
    Docs
    The SlackBook site (Eng)
    SlackBook 2 (Rus,PDF) 1.2Mb

    ISOs
    http://slackware.tsu.ru/slackware/slackware-iso
    http://slackware.tsu.ru/slackware/slackware-current-iso
    The ISO of the current version is available by email request. Feel free to email me.

    Contacts
    email: iskhartakh[at]gmail
    Tail of the ChangeLogs
    14.2 (x86)

    Mon Jun 7 18:53:49 UTC 2021
    patches/packages/httpd-2.4.48-i586-1_slack14.2.txz: Upgraded.
    This release contains security fixes and improvements.
    mod_http2: Fix a potential NULL pointer dereference.
    Unexpected section matching with 'MergeSlashes OFF'.
    mod_auth_digest: possible stack overflow by one nul byte while validating
    the Digest nonce.
    mod_session: Fix possible crash due to NULL pointer dereference, which
    could be used to cause a Denial of Service with a malicious backend
    server and SessionHeader.
    mod_session: Fix possible crash due to NULL pointer dereference, which
    could be used to cause a Denial of Service.
    mod_proxy_http: Fix possible crash due to NULL pointer dereference, which
    could be used to cause a Denial of Service.
    mod_proxy_wstunnel, mod_proxy_http: Handle Upgradable protocols end-to-end
    negotiation.
    For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31618
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30641
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35452
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26691
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26690
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13950
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17567
    (* Security fix *)
    patches/packages/libX11-1.7.2-i586-1_slack14.2.txz: Upgraded.
    This is a bug fix release, correcting a regression introduced by and
    improving the checks from the fix for CVE-2021-31535.
    patches/packages/polkit-0.113-i586-3_slack14.2.txz: Rebuilt.
    This update includes a mitigation for local privilege escalation using
    polkit_system_bus_name_get_creds_sync().
    For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3560
    (* Security fix *)
    Current (x86)

    Fri Jun 18 20:33:08 UTC 2021
    a/kernel-generic-5.12.12-i586-1.txz: Upgraded.
    a/kernel-generic-smp-5.12.12_smp-i686-1.txz: Upgraded.
    a/kernel-huge-5.12.12-i586-1.txz: Upgraded.
    a/kernel-huge-smp-5.12.12_smp-i686-1.txz: Upgraded.
    a/kernel-modules-5.12.12-i586-1.txz: Upgraded.
    a/kernel-modules-smp-5.12.12_smp-i686-1.txz: Upgraded.
    a/upower-0.99.12-i586-1.txz: Upgraded.
    d/kernel-headers-5.12.12_smp-x86-1.txz: Upgraded.
    d/rust-1.53.0-i686-1.txz: Upgraded.
    k/kernel-source-5.12.12_smp-noarch-1.txz: Upgraded.
    kde/kdeconnect-kde-21.04.2-i586-2.txz: Rebuilt.
    Recompiled against pulseaudio-qt-1.3.
    l/gdbm-1.20-i586-1.txz: Upgraded.
    n/bind-9.16.18-i586-1.txz: Upgraded.
    n/openvpn-2.5.3-i586-1.txz: Upgraded.
    extra/linux-5.12.12-nosmp-sdk/*: Upgraded.
    isolinux/initrd.img: Rebuilt.
    kernels/*: Upgraded.
    usb-and-pxe-installers/usbboot.img: Rebuilt.
    Current (x86_64)

    Fri Jun 18 20:33:08 UTC 2021
    a/kernel-generic-5.12.12-x86_64-1.txz: Upgraded.
    a/kernel-huge-5.12.12-x86_64-1.txz: Upgraded.
    a/kernel-modules-5.12.12-x86_64-1.txz: Upgraded.
    a/upower-0.99.12-x86_64-1.txz: Upgraded.
    d/kernel-headers-5.12.12-x86-1.txz: Upgraded.
    d/rust-1.53.0-x86_64-1.txz: Upgraded.
    k/kernel-source-5.12.12-noarch-1.txz: Upgraded.
    kde/kdeconnect-kde-21.04.2-x86_64-2.txz: Rebuilt.
    Recompiled against pulseaudio-qt-1.3.
    l/gdbm-1.20-x86_64-1.txz: Upgraded.
    n/bind-9.16.18-x86_64-1.txz: Upgraded.
    n/openvpn-2.5.3-x86_64-1.txz: Upgraded.
    isolinux/initrd.img: Rebuilt.
    kernels/*: Upgraded.
    usb-and-pxe-installers/usbboot.img: Rebuilt.
    © Snelius (2006-2021). Hosted@TSUNet