How to Install and Uninstall duma Package on Ubuntu 20.10 (Groovy Gorilla)

Last updated: April 28,2024

1. Install "duma" package

This tutorial shows how to install duma on Ubuntu 20.10 (Groovy Gorilla)

$ sudo apt update $ sudo apt install duma

2. Uninstall "duma" package

This tutorial shows how to uninstall duma on Ubuntu 20.10 (Groovy Gorilla):

$ sudo apt remove duma $ sudo apt autoclean && sudo apt autoremove

3. Information about the duma package on Ubuntu 20.10 (Groovy Gorilla)

Package: duma
Architecture: amd64
Version: 2.5.15-2build1
Priority: extra
Section: universe/devel
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Debian QA Group
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 251
Depends: libc6 (>= 2.4), libgcc-s1 (>= 3.0), libstdc++6 (>= 4.1.1)
Filename: pool/universe/d/duma/duma_2.5.15-2build1_amd64.deb
Size: 49324
MD5sum: a81e28ffa97e856137d49f669232dbe7
SHA1: 72c43f4f617a27f1e8d08be905b713ac7d9b5e9c
SHA256: abf1d15da7fb864fd0b7faaaf8147d50adfe79932bb87d18208826d879fed58e
SHA512: 062fffe0ad76992daaaa580cd2080290537c8989d2790f6c4e1fbbc25c6314514016a76d43c26fc3c42789b8a92e0242b9080fec91f3a94a2349345f2ce3a42d
Homepage: http://duma.sf.net
Description-en: library to detect buffer overruns and under-runs in C and C++ programs
Open-source library to detect buffer overruns and under-runs
in C and C++ programs.
.
This library is a fork of Bruce Perens Electric Fence library and adds
some new features to it. Features of the DUMA library:
* "overloads" all standard memory allocation functions like
malloc(), calloc(), memalign(), strdup(), operator new, operator
new[] and also their counterpart deallocation functions like free(),
operator delete and operator delete[]
* utilizes the MMU (memory management unit) of the CPU:
allocates and protects an extra memory page to detect any illegal
access beyond the top of the buffer (or bottom, at the user's option)
* stops the program at exactly that instruction, which does the
erroneous access to the protected memory page,
allowing location of the defective source code in a debugger
detects erroneous writes at the non-protected end of the memory
block at deallocation of the memory block
* detects mismatch of allocation/deallocation functions: f.e.
allocation with malloc() but deallocation with operator delete
* leak detection: detect memory blocks which were not deallocated
until program exit
* preloading of the library
* allowing tests without necessity of changing source code or recompilation
Description-md5: 9933ed7014c8b166d4e2e4b7ca1c5ff0