Slackware Security Announcement 2009-345-01: gimp


[slackware-security] gimp (SSA:2009-345-01)


New gimp packages are available for Slackware 12.1, 12.2, 13.0, and -current to

fix security issues.


More details about these issues may be found in the Common

Vulnerabilities and Exposures (CVE) database:



Here are the details from the Slackware 13.0 ChangeLog:


patches/packages/gimp-2.6.8-i486-1_slack13.0.txz: Upgraded.

This fixes integer overflows in the image handling plugins that could

lead to the execution of arbitrary code or an application crash if a

malicious image is loaded.

For more information, see:

(* Security fix *)




Where to find the new packages:



HINT: Getting slow download speeds from

Give a try. This is another primary FTP site

for Slackware that can be considerably faster than downloading

directly from


Thanks to the friendly folks at the OSU Open Source Lab

( for donating additional FTP and rsync hosting

to the Slackware project! 🙂


Also see the “Get Slack” section on for

additional mirror sites near you.


Updated package for Slackware 12.1:


Updated package for Slackware 12.2:


Updated package for Slackware 13.0:


Updated package for Slackware x86_64 13.0:


Updated package for Slackware -current:


Updated package for Slackware x86_64 -current:



MD5 signatures:



Slackware 12.1 package:

1f4e02babc22fb6ac3fc84b1c118d72b gimp-2.4.7-i486-1_slack12.1.tgz


Slackware 12.2 package:

b7c63449db64c9d1511b2080d323ed49 gimp-2.4.7-i486-2_slack12.2.tgz


Slackware 13.0 package:

b1921dfa3606ebc2ebc19a62e509dc71 gimp-2.6.8-i486-1_slack13.0.txz


Slackware x86_64 13.0 package:

0a9592c74c7de560c572e74345677343 gimp-2.6.8-x86_64-1_slack13.0.txz


Slackware -current package:

fcf74c662164e4d9e2f1040e8d2520c6 gimp-2.6.8-i486-1.txz


Slackware x86_64 -current package:

35afac41e102725a4d10ece7e7d93366 gimp-2.6.8-x86_64-1.txz



Installation instructions:



Upgrade the package as root:

# upgradepkg gimp-2.6.8-i486-1_slack13.0.txz





Slackware Linux Security Team

This e-mail address is being protected from spambots. You need JavaScript enabled to view it