upstream claims "works for me", but the respective mails don't indicate
that they actually ran ps2pdf (rather than just gs) on the supplied test
files.  Even if they did, it would appear that the core dump is seen due
by Ubuntu specific stack protection options.

That makes it likely that upstream has the problem as well but does not
see a core dump for it.

The recent ghostscript 9.07 security update in Raring Ringtail did not
fix this problem.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1184386

Title:
  Crash with __fortify_fail ***buffer overflow detected***

To manage notifications about this bug go to:
https://bugs.launchpad.net/gs-gpl/+bug/1184386/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to