On Sun, Sep 23, 2007 at 03:14:56PM +0300, Touko Korpela wrote: > # Automatically generated email from bts, devscripts version 2.10.8 > #this is causing segfaults in other packages, see bug 407002 > severity 287519 grave
I don't believe this is a bug in libmad. And if it's one in libmad, it's clearly a different one. It shows the error string: libmad: ALERT input buffer too small (22681 bytes, 16384 avail)! I don't know what generates that error string, but it's clearly not from the libmad in Debian. The function mad_stream_errorstr() can do: case MAD_ERROR_BUFLEN: return "input buffer too small (or EOF)"; And that is to indicate that it didn't get enough data. This error is returned by libmad in mad_header_decode(). It looks to me like libmad is working properly in this case, and that something else is causing a segfault. I suggest you start by running it under gdb or letting it generate a core file, to see where it really crashes. Kurt -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]