duma 2.5.21-6 source package in Ubuntu

Changelog

duma (2.5.21-6) unstable; urgency=medium

  * Lintian overrides
  * Bump standards version (no change)

 -- Peter Blackman <email address hidden>  Sun, 07 Aug 2022 14:00:00 +0100

Upload details

Uploaded by:
Peter B
Uploaded to:
Sid
Original maintainer:
Peter B
Architectures:
any
Section:
devel
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Mantic release universe devel
Lunar release universe devel

Downloads

File Size SHA-256 Checksum
duma_2.5.21-6.dsc 1.8 KiB 2caedeaa4dedccbf7c1acaabee9842d9f219e2e9ddce280d8185e530aae99b67
duma_2.5.21.orig.tar.gz 250.1 KiB 470aa72e7018f0beadb5fbe3c932a62ba1b0594c29158a744c614bfa42133e59
duma_2.5.21-6.debian.tar.xz 8.2 KiB a4a66314df7fdae02b0e5ad3052d998f9721433ca71698b9fe303376b61018a7

Available diffs

No changes file available.

Binary packages built by this source

duma: Detect Unintended Memory Access - A Red-Zone memory allocator

 Open-source library to detect buffer overruns and under-runs
 in C and C++ programs.
 .
 This library is a fork of Bruce Perens Electric Fence library and adds
 some new features to it. Features of the DUMA library:
   * "overloads" all standard memory allocation functions like
     malloc(), calloc(), memalign(), strdup(), operator new, operator
     new[] and also their counterpart deallocation functions like free(),
     operator delete and operator delete[]
   * utilizes the MMU (memory management unit) of the CPU:
     allocates and protects an extra memory page to detect any illegal
     access beyond the top of the buffer (or bottom, at the user's option)
   * stops the program at exactly that instruction, which does the
     erroneous access to the protected memory page,
     allowing location of the defective source code in a debugger
     detects erroneous writes at the non-protected end of the memory
     block at deallocation of the memory block
   * detects mismatch of allocation/deallocation functions: f.e.
     allocation with malloc() but deallocation with operator delete
   * leak detection: detect memory blocks which were not deallocated
     until program exit
   * preloading of the library
   * allowing tests without necessity of changing source code or recompilation

duma-dbgsym: debug symbols for duma