On modern Linux this bug causes abort with stack fortifier enabled. sprintf terminates 10-char string with '\0', and the array is 10 bytes long, causing overflow:
void paint_mem(GtkWidget widget, GdkEventExpose event, i8086core core, unsigned int startAdr)
{
char memstr="", tmp;
char numstr[10];
[...]
sprintf(numstr, "\n%04x:%04x", CAST_TO_BASE((startAdr+(icols))/0x10000, 17), (i808616BitAdr)(CAST_TO_MEMSIZE(startAdr+(i*cols))));
fixed in master - thx.