How to Install and Uninstall duma Package on Kali Linux
Last updated: December 22,2024
1. Install "duma" package
This guide let you learn how to install duma on Kali Linux
$
sudo apt update
Copied
$
sudo apt install
duma
Copied
2. Uninstall "duma" package
Please follow the instructions below to uninstall duma on Kali Linux:
$
sudo apt remove
duma
Copied
$
sudo apt autoclean && sudo apt autoremove
Copied
3. Information about the duma package on Kali Linux
Package: duma
Version: 2.5.21-8
Installed-Size: 296
Maintainer: Peter Blackman
Architecture: amd64
Depends: libc6 (>= 2.34), libgcc-s1 (>= 3.0), libstdc++6 (>= 4.1.1)
Size: 67956
SHA256: bd8ff11bf9e976c431efe2b81d53f35a39dd3eb76a698f8d21c52db01ac98cae
SHA1: 16c231127f2e8f91e54c73f93fcfe82b12b36652
MD5sum: 96a1cbe27e799886a76c3aa3d6e3c253
Description: Detect Unintended Memory Access - A Red-Zone memory allocator
Open-source library to detect buffer overruns and under-runs
in C and C++ programs.
.
This library is a fork of Bruce Perens Electric Fence library and adds
some new features to it. Features of the DUMA library:
* "overloads" all standard memory allocation functions like
malloc(), calloc(), memalign(), strdup(), operator new, operator
new[] and also their counterpart deallocation functions like free(),
operator delete and operator delete[]
* utilizes the MMU (memory management unit) of the CPU:
allocates and protects an extra memory page to detect any illegal
access beyond the top of the buffer (or bottom, at the user's option)
* stops the program at exactly that instruction, which does the
erroneous access to the protected memory page,
allowing location of the defective source code in a debugger
detects erroneous writes at the non-protected end of the memory
block at deallocation of the memory block
* detects mismatch of allocation/deallocation functions: f.e.
allocation with malloc() but deallocation with operator delete
* leak detection: detect memory blocks which were not deallocated
until program exit
* preloading of the library
* allowing tests without necessity of changing source code or recompilation
Description-md5:
Homepage: https://github.com/johnsonjh/duma
Tag: devel::debugger, devel::testing-qa, implemented-in::c,
implemented-in::c++, interface::commandline, role::plugin,
role::program, scope::utility, use::checking, works-with-format::elf,
works-with::software:running
Section: devel
Priority: optional
Filename: pool/main/d/duma/duma_2.5.21-8_amd64.deb
Version: 2.5.21-8
Installed-Size: 296
Maintainer: Peter Blackman
Architecture: amd64
Depends: libc6 (>= 2.34), libgcc-s1 (>= 3.0), libstdc++6 (>= 4.1.1)
Size: 67956
SHA256: bd8ff11bf9e976c431efe2b81d53f35a39dd3eb76a698f8d21c52db01ac98cae
SHA1: 16c231127f2e8f91e54c73f93fcfe82b12b36652
MD5sum: 96a1cbe27e799886a76c3aa3d6e3c253
Description: Detect Unintended Memory Access - A Red-Zone memory allocator
Open-source library to detect buffer overruns and under-runs
in C and C++ programs.
.
This library is a fork of Bruce Perens Electric Fence library and adds
some new features to it. Features of the DUMA library:
* "overloads" all standard memory allocation functions like
malloc(), calloc(), memalign(), strdup(), operator new, operator
new[] and also their counterpart deallocation functions like free(),
operator delete and operator delete[]
* utilizes the MMU (memory management unit) of the CPU:
allocates and protects an extra memory page to detect any illegal
access beyond the top of the buffer (or bottom, at the user's option)
* stops the program at exactly that instruction, which does the
erroneous access to the protected memory page,
allowing location of the defective source code in a debugger
detects erroneous writes at the non-protected end of the memory
block at deallocation of the memory block
* detects mismatch of allocation/deallocation functions: f.e.
allocation with malloc() but deallocation with operator delete
* leak detection: detect memory blocks which were not deallocated
until program exit
* preloading of the library
* allowing tests without necessity of changing source code or recompilation
Description-md5:
Homepage: https://github.com/johnsonjh/duma
Tag: devel::debugger, devel::testing-qa, implemented-in::c,
implemented-in::c++, interface::commandline, role::plugin,
role::program, scope::utility, use::checking, works-with-format::elf,
works-with::software:running
Section: devel
Priority: optional
Filename: pool/main/d/duma/duma_2.5.21-8_amd64.deb