upstream claims "works for me", but the respective mails don't indicate that they actually ran ps2pdf (rather than just gs) on the supplied test files. Even if they did, it would appear that the core dump is seen due by Ubuntu specific stack protection options.
That makes it likely that upstream has the problem as well but does not see a core dump for it. The recent ghostscript 9.07 security update in Raring Ringtail did not fix this problem. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1184386 Title: Crash with __fortify_fail ***buffer overflow detected*** To manage notifications about this bug go to: https://bugs.launchpad.net/gs-gpl/+bug/1184386/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs