Bug 480775 - Ghostscript ps2pdf gives "buffer overflow detected"
Ghostscript ps2pdf gives "buffer overflow detected"
Status: CLOSED DUPLICATE of bug 495916
Product: Fedora
Classification: Fedora
Component: ghostscript (Show other bugs)
All Linux
low Severity medium
: ---
: ---
Assigned To: Tim Waugh
Fedora Extras Quality Assurance
Depends On:
Blocks: CVE-2008-6679
  Show dependency treegraph
Reported: 2009-01-20 09:03 EST by Jeremy Sanders
Modified: 2009-04-15 12:09 EDT (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2009-04-15 12:09:15 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)
Postscript file to demonstrate crash (31.95 KB, application/x-compressed)
2009-01-20 09:03 EST, Jeremy Sanders
no flags Details

  None (edit)
Description Jeremy Sanders 2009-01-20 09:03:51 EST
Created attachment 329463 [details]
Postscript file to demonstrate crash

Description of problem:

Converting some PS figures to PDF gives:

$ ps2pdf Comparing_revmap_kband_figure.eps                              
** buffer overflow detected ***: gs terminated                                   
======= Backtrace: =========                                                      

Version-Release number of selected component (if applicable):

How reproducible:
Every time

Steps to Reproduce:
1. Run "ps2pdf Comparing_revmap_kband_figure.eps"
Actual results:

Expected results:
PDF file created

Additional info:
Comment 1 Jeremy Sanders 2009-01-20 09:09:30 EST
Apologies, I've just found that ghostscript has this in their bug database and it appears as if it is patched:
* http://bugs.ghostscript.com/show_bug.cgi?id=690211
* http://svn.ghostscript.com/viewvc?view=rev&sortby=rev&revision=9304
Comment 2 Tim Waugh 2009-04-15 12:09:15 EDT

*** This bug has been marked as a duplicate of bug 495916 ***

Note You need to log in before you can comment on or make changes to this bug.