[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#484473: ITP: duma -- an open-source library to detect buffer overruns and under-runs in C and C++ programs



Package: wnpp
Severity: wishlist
Owner: Julien Danjou <acid@debian.org>

* Package name    : duma
  Version         : 2.5.14
  Upstream Author : Hayati Ayguen <h_ayguen@web.de>
                    Michael Eddington <meddington@gmail.com>
* URL             : http://duma.sf.net
* License         : GPL
  Programming Lang: C
  Description     : an open-source library to detect buffer overruns and under-runs in C and C++ programs

DUMA is an open-source library (under GNU General Public License) to
detect buffer overruns and under-runs in C and C++ programs.
This library is a fork of Buce Perens Electric Fence library and adds
some new features to it. Features of the DUMA library:

  * "overloads" all standard memory allocation functions like
  * malloc(), calloc(), memalign(), strdup(), operator new, operator
  * new[] and also their counterpart deallocation functions like free(),
    operator delete and operator delete[]
  * utilizes the MMU (memory management unit) of the CPU:
    allocates and protects an extra memory page to detect any illegal
    access beyond the top of the buffer (or bottom, at the user's option)
  * stops the program at exactly that instruction, which does the
  * erroneous access to the protected memory page,
    allowing location of the defectice source code in a debugger
  * detects erroneous writes at the non-protected end of the memory
  * block at deallocation of the memory block
  * detects mismatch of allocation/deallocation functions: f.e.
  * allocation with malloc() but deallocation with operator delete
  * leak detection: detect memory blocks which were not deallocated
  * until program exit
  * runs on Linux / U*ix and MS Windows NT/2K/XP operating systems
  * preloading of the library on Linux (and some U*ix) systems
  * allowing tests without necessity of changing source code or
  * recompilation

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.25-2-amd64 (SMP w/2 CPU cores)
Locale: LANG=C, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

-- 
Julien Danjou
// ᐰ <julien@danjou.info>   http://julien.danjou.info
// 9A0D 5FD9 EB42 22F6 8974  C95C A462 B51E C2FE E5CD
// 

Attachment: signature.asc
Description: Digital signature


Reply to: