https://bugs.kde.org/show_bug.cgi?id=489088
--- Comment #5 from Sam James <s...@gentoo.org> --- (In reply to Mark Wielaard from comment #4) > See also https://bugs.kde.org/show_bug.cgi?id=391148 which comes with a > patch. Hi Mark, thanks for looking! That patch seems to work: ``` ==144687== Invalid read of size 8 ==144687== at 0x109F43: filter (test.c:59) ==144687== by 0x109F43: AnalyzeSamples (test.c:100) ==144687== by 0x109366: main (test.c:167) ==144687== Address 0x4637bfeabfe4bbd4 is not stack'd, malloc'd or (recently) free'd ==144687== ==144687== ==144687== Process terminating with default action of signal 11 (SIGSEGV): dumping core ==144687== General Protection Fault ==144687== at 0x109F43: filter (test.c:59) ==144687== by 0x109F43: AnalyzeSamples (test.c:100) ==144687== by 0x109366: main (test.c:167) ``` although the address looks a bit suspicious and I wasn't aware of out of bounds access in the testcase, so not sure if it really is decoding fully correctly? -- You are receiving this mail because: You are watching all bug changes.