How to Install and Uninstall duma Package on Ubuntu 21.10 (Impish Indri)
Last updated: December 28,2024
1. Install "duma" package
Here is a brief guide to show you how to install duma on Ubuntu 21.10 (Impish Indri)
$
sudo apt update
Copied
$
sudo apt install
duma
Copied
2. Uninstall "duma" package
Here is a brief guide to show you how to uninstall duma on Ubuntu 21.10 (Impish Indri):
$
sudo apt remove
duma
Copied
$
sudo apt autoclean && sudo apt autoremove
Copied
3. Information about the duma package on Ubuntu 21.10 (Impish Indri)
Package: duma
Architecture: amd64
Version: 2.5.15-2build1
Priority: extra
Section: universe/devel
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Debian QA Group
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 251
Depends: libc6 (>= 2.4), libgcc-s1 (>= 3.0), libstdc++6 (>= 4.1.1)
Filename: pool/universe/d/duma/duma_2.5.15-2build1_amd64.deb
Size: 49324
MD5sum: a81e28ffa97e856137d49f669232dbe7
SHA1: 72c43f4f617a27f1e8d08be905b713ac7d9b5e9c
SHA256: abf1d15da7fb864fd0b7faaaf8147d50adfe79932bb87d18208826d879fed58e
SHA512: 062fffe0ad76992daaaa580cd2080290537c8989d2790f6c4e1fbbc25c6314514016a76d43c26fc3c42789b8a92e0242b9080fec91f3a94a2349345f2ce3a42d
Homepage: http://duma.sf.net
Description-en: library to detect buffer overruns and under-runs in C and C++ programs
Open-source library to detect buffer overruns and under-runs
in C and C++ programs.
.
This library is a fork of Bruce Perens Electric Fence library and adds
some new features to it. Features of the DUMA library:
* "overloads" all standard memory allocation functions like
malloc(), calloc(), memalign(), strdup(), operator new, operator
new[] and also their counterpart deallocation functions like free(),
operator delete and operator delete[]
* utilizes the MMU (memory management unit) of the CPU:
allocates and protects an extra memory page to detect any illegal
access beyond the top of the buffer (or bottom, at the user's option)
* stops the program at exactly that instruction, which does the
erroneous access to the protected memory page,
allowing location of the defective source code in a debugger
detects erroneous writes at the non-protected end of the memory
block at deallocation of the memory block
* detects mismatch of allocation/deallocation functions: f.e.
allocation with malloc() but deallocation with operator delete
* leak detection: detect memory blocks which were not deallocated
until program exit
* preloading of the library
* allowing tests without necessity of changing source code or recompilation
Description-md5: 9933ed7014c8b166d4e2e4b7ca1c5ff0
Architecture: amd64
Version: 2.5.15-2build1
Priority: extra
Section: universe/devel
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Debian QA Group
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 251
Depends: libc6 (>= 2.4), libgcc-s1 (>= 3.0), libstdc++6 (>= 4.1.1)
Filename: pool/universe/d/duma/duma_2.5.15-2build1_amd64.deb
Size: 49324
MD5sum: a81e28ffa97e856137d49f669232dbe7
SHA1: 72c43f4f617a27f1e8d08be905b713ac7d9b5e9c
SHA256: abf1d15da7fb864fd0b7faaaf8147d50adfe79932bb87d18208826d879fed58e
SHA512: 062fffe0ad76992daaaa580cd2080290537c8989d2790f6c4e1fbbc25c6314514016a76d43c26fc3c42789b8a92e0242b9080fec91f3a94a2349345f2ce3a42d
Homepage: http://duma.sf.net
Description-en: library to detect buffer overruns and under-runs in C and C++ programs
Open-source library to detect buffer overruns and under-runs
in C and C++ programs.
.
This library is a fork of Bruce Perens Electric Fence library and adds
some new features to it. Features of the DUMA library:
* "overloads" all standard memory allocation functions like
malloc(), calloc(), memalign(), strdup(), operator new, operator
new[] and also their counterpart deallocation functions like free(),
operator delete and operator delete[]
* utilizes the MMU (memory management unit) of the CPU:
allocates and protects an extra memory page to detect any illegal
access beyond the top of the buffer (or bottom, at the user's option)
* stops the program at exactly that instruction, which does the
erroneous access to the protected memory page,
allowing location of the defective source code in a debugger
detects erroneous writes at the non-protected end of the memory
block at deallocation of the memory block
* detects mismatch of allocation/deallocation functions: f.e.
allocation with malloc() but deallocation with operator delete
* leak detection: detect memory blocks which were not deallocated
until program exit
* preloading of the library
* allowing tests without necessity of changing source code or recompilation
Description-md5: 9933ed7014c8b166d4e2e4b7ca1c5ff0