[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#484473: marked as done (ITP: duma -- an open-source library to detect buffer overruns and under-runs in C and C++ programs)



Your message dated Sun, 15 Jun 2008 16:28:31 +0000
with message-id <E1K7v5j-0004Fr-F6@ries.debian.org>
and subject line Bug#484473: fixed in duma 2.5.14-1
has caused the Debian Bug report #484473,
regarding ITP: duma -- an open-source library to detect buffer overruns and  under-runs in C and C++ programs
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
484473: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484473
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Severity: wishlist
Owner: Julien Danjou <acid@debian.org>

* Package name    : duma
  Version         : 2.5.14
  Upstream Author : Hayati Ayguen <h_ayguen@web.de>
                    Michael Eddington <meddington@gmail.com>
* URL             : http://duma.sf.net
* License         : GPL
  Programming Lang: C
  Description     : an open-source library to detect buffer overruns and under-runs in C and C++ programs

DUMA is an open-source library (under GNU General Public License) to
detect buffer overruns and under-runs in C and C++ programs.
This library is a fork of Buce Perens Electric Fence library and adds
some new features to it. Features of the DUMA library:

  * "overloads" all standard memory allocation functions like
  * malloc(), calloc(), memalign(), strdup(), operator new, operator
  * new[] and also their counterpart deallocation functions like free(),
    operator delete and operator delete[]
  * utilizes the MMU (memory management unit) of the CPU:
    allocates and protects an extra memory page to detect any illegal
    access beyond the top of the buffer (or bottom, at the user's option)
  * stops the program at exactly that instruction, which does the
  * erroneous access to the protected memory page,
    allowing location of the defectice source code in a debugger
  * detects erroneous writes at the non-protected end of the memory
  * block at deallocation of the memory block
  * detects mismatch of allocation/deallocation functions: f.e.
  * allocation with malloc() but deallocation with operator delete
  * leak detection: detect memory blocks which were not deallocated
  * until program exit
  * runs on Linux / U*ix and MS Windows NT/2K/XP operating systems
  * preloading of the library on Linux (and some U*ix) systems
  * allowing tests without necessity of changing source code or
  * recompilation

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.25-2-amd64 (SMP w/2 CPU cores)
Locale: LANG=C, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

-- 
Julien Danjou
// ᐰ <julien@danjou.info>   http://julien.danjou.info
// 9A0D 5FD9 EB42 22F6 8974  C95C A462 B51E C2FE E5CD
// 

Attachment: signature.asc
Description: Digital signature


--- End Message ---
--- Begin Message ---
Source: duma
Source-Version: 2.5.14-1

We believe that the bug you reported is fixed in the latest version of
duma, which is due to be installed in the Debian FTP archive:

duma_2.5.14-1.diff.gz
  to pool/main/d/duma/duma_2.5.14-1.diff.gz
duma_2.5.14-1.dsc
  to pool/main/d/duma/duma_2.5.14-1.dsc
duma_2.5.14-1_amd64.deb
  to pool/main/d/duma/duma_2.5.14-1_amd64.deb
duma_2.5.14.orig.tar.gz
  to pool/main/d/duma/duma_2.5.14.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 484473@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Julien Danjou <acid@debian.org> (supplier of updated duma package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Thu, 12 Jun 2008 11:23:57 +0200
Source: duma
Binary: duma
Architecture: source amd64
Version: 2.5.14-1
Distribution: unstable
Urgency: low
Maintainer: Julien Danjou <acid@debian.org>
Changed-By: Julien Danjou <acid@debian.org>
Description: 
 duma       - library to detect buffer overruns and under-runs in C and C++ pro
Closes: 484473
Changes: 
 duma (2.5.14-1) unstable; urgency=low
 .
   * Initial release (Closes: #484473)
Checksums-Sha1: 
 d22f4b9ab1d790e8884d022322642ca6310d54fe 957 duma_2.5.14-1.dsc
 c99bd748e58608e3614ac3a3b1511eded7b9465a 237777 duma_2.5.14.orig.tar.gz
 ee0e7dc14ce3d79e611fcd8a25a25ea06aa245d0 4209 duma_2.5.14-1.diff.gz
 19398413d5193b135ec2c923533001e1fbf49e3f 61068 duma_2.5.14-1_amd64.deb
Checksums-Sha256: 
 b693e4d655c60dcf62386274c7403e13a2cbb90e50ce3a8e98bf3b567123999e 957 duma_2.5.14-1.dsc
 91d9cc49e7aae7da342b1422521ba08b82685b666630bc64a7a97eab47520258 237777 duma_2.5.14.orig.tar.gz
 c1e31067091106b6c6e6e8d00d2db43e786506bb961af4d57f4d856d3a3023b0 4209 duma_2.5.14-1.diff.gz
 b4d6d7505f6f8d73be76e6a2285ec44abe49bc1c7a589d254913cd1a14d45445 61068 duma_2.5.14-1_amd64.deb
Files: 
 22f92373acec159a34ed493187596d9e 957 devel extra duma_2.5.14-1.dsc
 d25ea8b10fe3611b9c86d2b3a523e1d2 237777 devel extra duma_2.5.14.orig.tar.gz
 494d07c2c2b046da4080ef04cfd555e0 4209 devel extra duma_2.5.14-1.diff.gz
 ec5cfbb05bfea15844133808cef62270 61068 devel extra duma_2.5.14-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkhQ8tgACgkQpGK1HsL+5c1+qQCeO3nq9rkoY88BUSqtpe0j5WD3
Fl0An1To9VfD0TnWf8AKln2m3T0QDRAO
=fLaJ
-----END PGP SIGNATURE-----



--- End Message ---

Reply to: