Language Selection

English French German Italian Portuguese Spanish

Development version: GIMP 2.99.8 Released

Filed under
GNU
GIMP

GIMP 2.99.8 is our new development version, once again coming with a huge set of improvements.

Read more

Some early coverage:

  • GIMP 2.99.8 Released with Clone Tool Tweaks, Support for Windows Ink

    A new development version of GIMP is available to download and it carries some interesting new features.

    While this isn’t a new stable release — GIMP 2.10.28 is the most recent stable release (and the version you’ll find in Ubuntu 21.10’s archives) — the release of GIMP 2.99.8 is yet another brick in the road to the long-fabled GIMP 3.0 release.

    And it’s a fairly substantial brick, at that.

  • GIMP 2.99.8 Released As Another Step Toward The Long Overdue GIMP 3.0

    GIMP 3.0 as the GTK3 port of this open-source Adobe Photoshop alternative has been talked about for nearly a decade now and the work remains ongoing. However, out today is GIMP 2.99.8 as the newest development snapshot.

GIMP 2.99.8 Released with .jxl File Support, How to Install

GIMP 2.99.8 is here but what's happened to 3.0?

  • GIMP 2.99.8 is here but what's happened to 3.0? If only stuff would not break all the time

    The GNU Image Manipulation Program is a full-featured bitmap image editor with a long history, the first public release being January 1996. Version 1.0 came in June 1998.

    It is appreciated for its extensive features (and free price) but development is slow. The current production version is 2.10, the first version of which came out in April 2010, built using Gtk 2.x. That said, GIMP 2.10 is regularly updated, most recently with 2.10.28 last month, featuring many bug fixes especially on Windows.

GIMP 2.99.8

  • GIMP 2.99.8

    Much of the release notes for the newly arrived GIMP 2.99.8 covers continuous integration changes. While it might be a boring topic for you, especially if you are in the “DO WANT FEATURES” camp, this is actually great. Here is why.

    If someone fixed a bug that annoyed you or implemented a new feature that you really wanted, you can now test this on your operating system of choice and provide feedback to both the contributor and GIMP developers before they cut a release or sometimes even before they merge a fix or a feature into main development branch.

    It’s a kind of a big deal when you think how much folklore is rooted in a belief that GIMP developers don’t listen to users.

    Speaking of which, you can now use clone tools on multiple layers. The feature was requested and sponsored by Gleb Alexandrov of Creative Shrimp. His use case is working on multiple maps of the same material in a photoscanning workflow.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Top 4 Linux Distros for Beginners (2022)

As we come into the new year, it might be part of your New Year’s Resolution to make the big move to the amazing world that is the Linux OS. If so, then the first hurdle you will have to overcome is choosing what distribution (distro) you want to use. Read more

’Nordic’ GTK Theme Brings Nord Color Scheme to Linux Desktops

If you want to bring the chilled out tones of the popular Nord theme to your Ubuntu desktop you simply must check out the ‘Nordic’ GTK theme. The Nordic GTK theme is a faithful implementation of the popular colour-scheme of the Nord theme For GTK-based desktop environment. Like the similarly-ubiquitous Dracula theme, Nord is a hugely popular colour scheme with developers, and there are a ton of ports for all kinds of applications. Originally created to provide “optimal focus and readability for code”, Nord has bloomed in popularity with developers and non-developers alike. Read more

Günther Wagner - Announce new release 0.9.0 of librest

I’m pleased to announce the release of 0.9.0 of librest, a library meant to interact with “Restful” web services. This library is very old and not really big but it handles the aspect of interaction with REST-APIs in a convenient fashion. After a long period of maintenance state i picked it up and brought it into 2022. Most of the deprecated API calls are gone now and it should be now possible to parallel-install librest with the previous release. Read more

Security Leftovers

  • GCC 12 Ready To Help Fend Off Trojan Source Attacks - Phoronix

    Disclosed a few months back were "Trojan Source" attacks against compilers where specially crafted code could be rogue but not appear so due to exploiting Unicode issues. Unicode control characters could be used to reorder tokens in source code that could alter the behavior when compiled. With the upcoming GCC 12 compiler release there is a new warning to help point out possible Trojan Source attacks.

  • Vulnerability in cryptsetup Allows Decrypting Part of LUKS2-Encrypted Device

    An attacker with physical access to the medium could use this flaw to force a user into permanently disabling the encryption layer of that medium. Many enterprises, small businesses, and government users need to encrypt their laptops to protect confidential information such as customer details, files, contact information, and much more. LUKS (Linux Unified Key Setup) is the standard for Linux hard disk encryption and it is transparent to the user as it operates below the filesystem layer. Basically, it is a block device encryption, which means that when a block from disk is read or written the encryption module at kernel level works for us, like a translator. [...] This attack requires repeated physical access to the LUKS device but no knowledge of user passphrases. The decryption step is performed after a valid user activates the device with a correct passphrase and modified metadata. There are no visible warnings for the user that such recovery happened. The attack can also be reversed afterward with possible modification of revealed plaintext.

  • Microsoft Warns of Destructive Malware Targeting Ukrainian Organizations [Ed: Highly misleading headline and misdirection, suggestive of Microsoft controlling CISA and using it to deflect blame]

    Microsoft has released a blog post on possible Master Boot Record (MBR) Wiper activity targeting Ukrainian organizations, including Ukrainian government agencies. According to Microsoft, powering down the victim device executes the malware, which overwrites the MBR with a ransom note; however, the ransom note is a ruse because the malware actually destroys the MBR and the targeted files.