Your message dated Sun, 15 Jun 2008 16:28:31 +0000 with message-id <E1K7v5j-0004Fr-F6@ries.debian.org> and subject line Bug#484473: fixed in duma 2.5.14-1 has caused the Debian Bug report #484473, regarding ITP: duma -- an open-source library to detect buffer overruns and under-runs in C and C++ programs to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 484473: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484473 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: ITP: duma -- an open-source library to detect buffer overruns and under-runs in C and C++ programs
- From: Julien Danjou <acid@debian.org>
- Date: Wed, 4 Jun 2008 11:14:44 +0200
- Message-id: <[🔎] 20080604091444.GA13304@abydos.adm.naquadah.org>
Package: wnpp Severity: wishlist Owner: Julien Danjou <acid@debian.org> * Package name : duma Version : 2.5.14 Upstream Author : Hayati Ayguen <h_ayguen@web.de> Michael Eddington <meddington@gmail.com> * URL : http://duma.sf.net * License : GPL Programming Lang: C Description : an open-source library to detect buffer overruns and under-runs in C and C++ programs DUMA is an open-source library (under GNU General Public License) to detect buffer overruns and under-runs in C and C++ programs. This library is a fork of Buce Perens Electric Fence library and adds some new features to it. Features of the DUMA library: * "overloads" all standard memory allocation functions like * malloc(), calloc(), memalign(), strdup(), operator new, operator * new[] and also their counterpart deallocation functions like free(), operator delete and operator delete[] * utilizes the MMU (memory management unit) of the CPU: allocates and protects an extra memory page to detect any illegal access beyond the top of the buffer (or bottom, at the user's option) * stops the program at exactly that instruction, which does the * erroneous access to the protected memory page, allowing location of the defectice source code in a debugger * detects erroneous writes at the non-protected end of the memory * block at deallocation of the memory block * detects mismatch of allocation/deallocation functions: f.e. * allocation with malloc() but deallocation with operator delete * leak detection: detect memory blocks which were not deallocated * until program exit * runs on Linux / U*ix and MS Windows NT/2K/XP operating systems * preloading of the library on Linux (and some U*ix) systems * allowing tests without necessity of changing source code or * recompilation -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 2.6.25-2-amd64 (SMP w/2 CPU cores) Locale: LANG=C, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash -- Julien Danjou // ᐰ <julien@danjou.info> http://julien.danjou.info // 9A0D 5FD9 EB42 22F6 8974 C95C A462 B51E C2FE E5CD //Attachment: signature.asc
Description: Digital signature
--- End Message ---
--- Begin Message ---
- To: 484473-close@bugs.debian.org
- Subject: Bug#484473: fixed in duma 2.5.14-1
- From: Julien Danjou <acid@debian.org>
- Date: Sun, 15 Jun 2008 16:28:31 +0000
- Message-id: <E1K7v5j-0004Fr-F6@ries.debian.org>
Source: duma Source-Version: 2.5.14-1 We believe that the bug you reported is fixed in the latest version of duma, which is due to be installed in the Debian FTP archive: duma_2.5.14-1.diff.gz to pool/main/d/duma/duma_2.5.14-1.diff.gz duma_2.5.14-1.dsc to pool/main/d/duma/duma_2.5.14-1.dsc duma_2.5.14-1_amd64.deb to pool/main/d/duma/duma_2.5.14-1_amd64.deb duma_2.5.14.orig.tar.gz to pool/main/d/duma/duma_2.5.14.orig.tar.gz A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 484473@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Julien Danjou <acid@debian.org> (supplier of updated duma package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.8 Date: Thu, 12 Jun 2008 11:23:57 +0200 Source: duma Binary: duma Architecture: source amd64 Version: 2.5.14-1 Distribution: unstable Urgency: low Maintainer: Julien Danjou <acid@debian.org> Changed-By: Julien Danjou <acid@debian.org> Description: duma - library to detect buffer overruns and under-runs in C and C++ pro Closes: 484473 Changes: duma (2.5.14-1) unstable; urgency=low . * Initial release (Closes: #484473) Checksums-Sha1: d22f4b9ab1d790e8884d022322642ca6310d54fe 957 duma_2.5.14-1.dsc c99bd748e58608e3614ac3a3b1511eded7b9465a 237777 duma_2.5.14.orig.tar.gz ee0e7dc14ce3d79e611fcd8a25a25ea06aa245d0 4209 duma_2.5.14-1.diff.gz 19398413d5193b135ec2c923533001e1fbf49e3f 61068 duma_2.5.14-1_amd64.deb Checksums-Sha256: b693e4d655c60dcf62386274c7403e13a2cbb90e50ce3a8e98bf3b567123999e 957 duma_2.5.14-1.dsc 91d9cc49e7aae7da342b1422521ba08b82685b666630bc64a7a97eab47520258 237777 duma_2.5.14.orig.tar.gz c1e31067091106b6c6e6e8d00d2db43e786506bb961af4d57f4d856d3a3023b0 4209 duma_2.5.14-1.diff.gz b4d6d7505f6f8d73be76e6a2285ec44abe49bc1c7a589d254913cd1a14d45445 61068 duma_2.5.14-1_amd64.deb Files: 22f92373acec159a34ed493187596d9e 957 devel extra duma_2.5.14-1.dsc d25ea8b10fe3611b9c86d2b3a523e1d2 237777 devel extra duma_2.5.14.orig.tar.gz 494d07c2c2b046da4080ef04cfd555e0 4209 devel extra duma_2.5.14-1.diff.gz ec5cfbb05bfea15844133808cef62270 61068 devel extra duma_2.5.14-1_amd64.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkhQ8tgACgkQpGK1HsL+5c1+qQCeO3nq9rkoY88BUSqtpe0j5WD3 Fl0An1To9VfD0TnWf8AKln2m3T0QDRAO =fLaJ -----END PGP SIGNATURE-----
--- End Message ---