On Sun, Sep 23, 2007 at 03:14:56PM +0300, Touko Korpela wrote:
> # Automatically generated email from bts, devscripts version 2.10.8
> #this is causing segfaults in other packages, see bug 407002
> severity 287519 grave

I don't believe this is a bug in libmad.  And if it's one in libmad,
it's clearly a different one.

It shows the error string:
libmad: ALERT input buffer too small (22681 bytes, 16384 avail)!

I don't know what generates that error string, but it's clearly not
from the libmad in Debian.  The function mad_stream_errorstr()
can do:
  case MAD_ERROR_BUFLEN:         return "input buffer too small (or EOF)";

And that is to indicate that it didn't get enough data.  This error is
returned by libmad in mad_header_decode().  It looks to me like libmad
is working properly in this case, and that something else is causing
a segfault.

I suggest you start by running it under gdb or letting it generate
a core file, to see where it really crashes.


Kurt




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to