Jump to content

MPEG Audio Decoder

From Wikipedia, the free encyclopedia
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.
madplay
Developer(s)Robert Leslie
Initial release2000
Stable release
0.15.2b / February 23, 2004 (2004-02-23)
Repositorysourceforge.net/projects/mad/
Written inC
Operating systemLinux, FreeBSD, macOS
TypeMedia player
LicenseGPLv2[1]
Websiteunderbit.com/products/mad/

MPEG Audio Decoder (MAD) is a GPL library for decoding files that have been encoded with an MPEG audio codec.[2] It was written by Robert Leslie and produced by Underbit Technologies. It was developed as a new implementation, on the ISO/IEC standards.[3]

It consists of libmad, a software library, and madplay, a command-line program for MP3 playback. libmad is notable for using only fixed-point arithmetic[3][4][5] while madplay is notable for its ReplayGain support.

Development ended decades ago, and vulnerabilities identified since then have gone unpatched.[6][7][8]

References

  1. ^ "GNU General Public License". underbit. Retrieved 6 September 2019.
  2. ^ "MPEG Players & Encoders". linux-sound.org. Retrieved November 3, 2011. MAD Robert Leslie's GPL'd MPEG audio decoder
  3. ^ a b "MAD". Freecode. Retrieved November 3, 2011. MAD is a high-quality MPEG audio decoder capable of 24-bit output. All computations are performed with fixed-point integer arithmetic, making it ideal for systems without a floating-point unit. The implementation is entirely new, based on the ISO/IEC standards.
  4. ^ "MPEG source codes". mp3-tech.org. Retrieved November 3, 2011. MAD is an mpeg-1 decoder using only integer computation.
  5. ^ "madplay". Ubuntu Manpage Repository. Archived from the original on April 4, 2012. Retrieved November 3, 2011. Among the special features of MAD are 24-bit PCM resolution and 100% fixed-point (integer) computation.
  6. ^ "CVE - CVE-2017-8373". cve.mitre.org. Retrieved 2024-02-13.
  7. ^ "CVE - CVE-2017-8374". cve.mitre.org. Retrieved 2024-02-13.
  8. ^ "CVE - CVE-2017-11552". cve.mitre.org. Retrieved 2024-02-13.