Looks like the logic inside modern Intel CPUs are too aggressive in pre-loading cache data and forget to check security boundaries... loading data from kernel (or possible other code space) into a region that malicious code could have access too:
Good starting links for learning about dithering:
Remapping channels to/from other devices (examples): (remember pacmd)
# from XR18 to OSB (inputs)
load-module module-remap-source channels=2 [...]
The fork with features (branches) and one fix (already applied upstream to original project).
* local icons (the TTF is open source, and not everybody will have internet access)
* two panels for Transitions and Panels
The upstream project maintainer will probably accept the feature pulls soon.
at commit: 858db4b01fa2b55ee55056c033054ca54ac9b0fd
(documented the morning after, but believe this is correct)