Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

libsdb2_2_4-6.0.7-1.1 RPM for i586

From OpenSuSE Ports Tumbleweed for i586

Name: libsdb2_2_4 Distribution: openSUSE Tumbleweed
Version: 6.0.7 Vendor: openSUSE
Release: 1.1 Build date: Sat Dec 6 16:57:07 2025
Group: Development/Tools/Debuggers Build host: reproducible
Size: 239024 Source RPM: radare2-6.0.7-1.1.src.rpm
Packager: http://bugs.opensuse.org
Url: https://www.radare.org
Summary: Simple string key/value database
sdb is a simple string key/value database based on djb's cdb disk
storage and supports JSON and arrays introspection.

Provides

Requires

License

GPL-3.0-only AND LGPL-3.0-only

Changelog

* Sat Dec 06 2025 Eyad Issa <eyadlorenzo@gmail.com>
  - Add %check section and test bins
* Sat Dec 06 2025 Eyad Issa <eyadlorenzo@gmail.com>
  - Rename sdb.1 man page to r2sdb.1 to avoid conflict with snobol4
* Thu Dec 04 2025 Eyad Issa <eyadlorenzo@gmail.com>
  - Fix patch pkgconfig.patch to be -p1-able
  - Update to version 6.0.7:
    * shell: Fix parsing r2 -H$(VARNAME) without a space
  - Update to version 6.0.6:
    * Full changelog is available at:
      https://github.com/radareorg/radare2/releases/tag/6.0.6
  - Update to version 6.0.4:
    * Full changelog is available at:
      https://github.com/radareorg/radare2/releases/tag/6.0.4
  - Update to version 6.0.2:
    * Full changelog is available at:
      https://github.com/radareorg/radare2/releases/tag/6.0.2
* Thu Dec 04 2025 Dr. Werner Fink <werner@suse.de>
  - Add missing sub directories for r_util.h and r_muta.h
    otherwise it might fails in calling r2pm -ci <plugin>
* Thu Dec 04 2025 Dr. Werner Fink <werner@suse.de>
  - Correct library package nameing scheme to make it build
    also on x86_64 on 15.6 and 15.7
* Wed Jul 30 2025 Eyad Issa <eyadlorenzo@gmail.com>
  - Remove patches CVE-2025-1378.patch, CVE-2025-1864.patch,
    CVE-2025-1744.patch, CVE-2025-5641.patch: merged upstream
  - Update to version 6.0.0:
    * ABI changes:
      ~ RCorePlugins now have a session
      ~ Finish the RKons refactoring, all r_cons calls take instance instead of global
      ~ Rename RCrypto to RMuta
      ~ Use RCons instance from RLine
      ~ Rename RIOPlugin.widget to RIOPlugin.data
      ~ Refactor the RRegAlias api
      ~ Camelcase all the RCoreBind methods
    * Breaking API changes:
      ~ Boolify r_cons_rgb_parse
      ~ Add RLogLevel.fromString() and use it from -e log.level=?
      ~ Deprecate r_bin_addr2line
      ~ Rename RBinDbgItem into RBinAddrline
      ~ RNumCalc is now known as RNumMath
      ~ Move RFlagItem.alias into the Meta
      ~ Rename core->offset into core->addr (asm.offset and more!)
      ~ Rename RFlagItem.offset -> addr
    * API changes:
      ~ Boolify r_cons_rgb_parse
      ~ Add RLogLevel.fromString() and use it from -e log.level=?
      ~ Deprecate r_bin_addr2line
      ~ Rename RBinDbgItem into RBinAddrline
      ~ RNumCalc is now known as RNumMath
      ~ Move RFlagItem.alias into the Meta
      ~ Rename core->offset into core->addr (asm.offset and more!)
      ~ Rename RFlagItem.offset -> addr
      ~ Deprecate RLang.list()
      ~ Unified function to jsonify the plugin meta + more fields
      ~ Redesign the REvent API
    * Full changelog is available at:
      https://github.com/radareorg/radare2/releases/tag/6.0.0
* Wed Jun 11 2025 Dirk Müller <dmueller@suse.com>
  - add CVE-2025-5641.patch as a warning that the threaded option
    is known to be unsafe (bsc#1244121, CVE-2025-5641)
  - refresh other patches
* Tue Mar 04 2025 Alexander Bergmann <abergmann@suse.com>
  - Fix buffer overflow and potential code execution.
    add CVE-2025-1864.patch (bsc#1238451, CVE-2025-1864)
  - Fix heap-based buffer over-read or buffer overflow.
    add CVE-2025-1744.patch (bsc#1238075, CVE-2025-1744)
  - Add explicit Python 3 build requirement.
* Mon Feb 17 2025 Dirk Müller <dmueller@suse.com>
  - add CVE-2025-1378.patch (bsc#1237250, CVE-2025-1378)
* Tue Dec 03 2024 Alexander Bergmann <abergmann@suse.com>
  - Update to version 5.9.8:
    * Resolved CVE:
    - CVE-2024-29645: buffer overflow vulnerability allows an attacker to
      execute arbitrary code via the parse_die function (boo#1234065).
    For details, check full release notes:
    https://github.com/radareorg/radare2/releases/tag/5.9.8
    https://github.com/radareorg/radare2/releases/tag/5.9.6
    https://github.com/radareorg/radare2/releases/tag/5.9.4
    https://github.com/radareorg/radare2/releases/tag/5.9.2
    https://github.com/radareorg/radare2/releases/tag/5.9.0
* Wed Oct 18 2023 Dominique Leuenberger <dimstar@opensuse.org>
  - Update to version 5.8.8:
    For details, check full release notes"
    https://github.com/radareorg/radare2/releases/tag/5.8.8
* Wed May 17 2023 Alexander Bergmann <abergmann@suse.com>
  - Update to 5.8.6
    For details, check full release notes:
    https://github.com/radareorg/radare2/releases/tag/5.8.6
    - This fixes CVE-2023-1605 (boo#1209686).
* Tue Nov 15 2022 Dominique Leuenberger <dimstar@opensuse.org>
  - Update to version 5.7.8 (boo#1201820, CVE-2022-34502):
    + Heap buffer overflow via the function consume_encoded_name_new
    + Significant number of changes and bug fixes since 5.7.0
* Thu Jun 09 2022 Timothy Brown <stimut@gmail.com>
  - Update to 5.7.0
    * Significant number of changes and bug fixes
    * Resolves 38 CVEs
    - CVE-2022-0139 - https://bugzilla.opensuse.org/show_bug.cgi?id=1195713
    - CVE-2022-0173
    - CVE-2022-0419 - https://bugzilla.opensuse.org/show_bug.cgi?id=1195444
    - CVE-2022-0476 - https://bugzilla.opensuse.org/show_bug.cgi?id=1196414
    - CVE-2022-0518 - https://bugzilla.opensuse.org/show_bug.cgi?id=1195746
    - CVE-2022-0519 - https://bugzilla.opensuse.org/show_bug.cgi?id=1195761
    - CVE-2022-0520 - https://bugzilla.opensuse.org/show_bug.cgi?id=1195741
    - CVE-2022-0521 - https://bugzilla.opensuse.org/show_bug.cgi?id=1195760
    - CVE-2022-0522 - https://bugzilla.opensuse.org/show_bug.cgi?id=1195742
    - CVE-2022-0523 - https://bugzilla.opensuse.org/show_bug.cgi?id=1195720
    - CVE-2022-0559 - https://bugzilla.opensuse.org/show_bug.cgi?id=1196052
    - CVE-2022-0676 - https://bugzilla.opensuse.org/show_bug.cgi?id=1196345
    - CVE-2022-0695 - https://bugzilla.opensuse.org/show_bug.cgi?id=1196484
    - CVE-2022-0712 - https://bugzilla.opensuse.org/show_bug.cgi?id=1196320
    - CVE-2022-0713 - https://bugzilla.opensuse.org/show_bug.cgi?id=1196319
    - CVE-2022-0849 - https://bugzilla.opensuse.org/show_bug.cgi?id=1196819
    - CVE-2022-1031 - https://bugzilla.opensuse.org/show_bug.cgi?id=1197420
    - CVE-2022-1052 - https://bugzilla.opensuse.org/show_bug.cgi?id=1197509
    - CVE-2022-1061 - https://bugzilla.opensuse.org/show_bug.cgi?id=1197508
    - CVE-2022-1207 - https://bugzilla.opensuse.org/show_bug.cgi?id=1197991
    - CVE-2022-1237 - https://bugzilla.opensuse.org/show_bug.cgi?id=1198185
    - CVE-2022-1238 - https://bugzilla.opensuse.org/show_bug.cgi?id=1198186
    - CVE-2022-1240 - https://bugzilla.opensuse.org/show_bug.cgi?id=1198187
    - CVE-2022-1244 - https://bugzilla.opensuse.org/show_bug.cgi?id=1198132
    - CVE-2022-1283 - https://bugzilla.opensuse.org/show_bug.cgi?id=1198291
    - CVE-2022-1284 - https://bugzilla.opensuse.org/show_bug.cgi?id=1198292
    - CVE-2022-1296 - https://bugzilla.opensuse.org/show_bug.cgi?id=1198375
    - CVE-2022-1297 - https://bugzilla.opensuse.org/show_bug.cgi?id=1198376
    - CVE-2022-1382 - https://bugzilla.opensuse.org/show_bug.cgi?id=1198592
    - CVE-2022-1383 - https://bugzilla.opensuse.org/show_bug.cgi?id=1198593
    - CVE-2022-1437 - https://bugzilla.opensuse.org/show_bug.cgi?id=1198804
    - CVE-2022-1444 - https://bugzilla.opensuse.org/show_bug.cgi?id=1198805
    - CVE-2022-1451 - https://bugzilla.opensuse.org/show_bug.cgi?id=1198807
    - CVE-2022-1452 - https://bugzilla.opensuse.org/show_bug.cgi?id=1198808
    - CVE-2022-1649 - https://bugzilla.opensuse.org/show_bug.cgi?id=1199418
    - CVE-2022-1714 - https://bugzilla.opensuse.org/show_bug.cgi?id=1199555
    - CVE-2022-1809 - https://bugzilla.opensuse.org/show_bug.cgi?id=1199806
    - CVE-2022-1899 - https://bugzilla.opensuse.org/show_bug.cgi?id=1199972
  - Remove unneeded libewf dependency
* Tue Feb 01 2022 Paolo Stivanin <info@paolostivanin.com>
  - Update to 5.5.4:
    * New IOBanks APis and commands replacing skyline and making io faster (2-10x)
    * Faster analysis, type matching, binary parsing (2-4x)
    * [] and =[] esil operations has been removed (size is mandatory)
    * Lots of important bugs fixed in bin parsers and disassemblers
    * Add support for the latest iOS15 dyld4 Atlas-style cache formats
    * Autorename signature matching collisions and faster search
    * Add assembler for riscv and disassemblers for PDP11, Alpha64 and armv7.v35
    * Improved integration with r2frida remote filesystems
    * Cleaning debugger for windows (32 and 64) and macOS makes it more reliable and stable
    * Add seven segment printing (?ea for ascii-art text titles)
    * Improved xrefs visualization with new axfm and axtm commands
    * Add avg command to manage global variables
    * The sixref plugin is now easier to use to find xrefs on arm64 code
    * Improved multibin (select all bins or one) and multidex support in apk://
    * Better build scripts for Windows (add asan and w32 profiles)
    * Added armv7.v35 and improves esil emulation with the arm64.v35
    * Add more help messages and set scr.prompt.tabhelp true by default
    * AES key wrap algorithm support in rahash2
    * Fix var serialization issues in debugger reloading (ood) and projects saving (Ps)
    * Add Amiga and MSX rom/bin parser plugin and test @romerojoseant @trufae
    * Visual slides (r2s) allow interactive content to be used within r2
    * Print and convert ternary values back and forth
    * Add the vector35 arm64 for analysis, esil and disasm and r2 can be built without capstone
    * Improved integration to use r2ghidra analysis and disassemble mainly tested for avr, v850 and arm64
    * Fix emulation of several x86 and arm64 instructions, including an scripted way
      to import official arm64 instruction descriptions
    * Bring back the cmd.pin to instrument the esil emulation when a specific address is hit
    * Small steps towards Projects with improved management for version control
    * Improved visual and panels with better interactions and fixed glitches
  - Remove CVE-2021-3673.patch

Files

/usr/lib/libsdb.so.2.2.4


Generated by rpm2html 1.8.1

Fabrice Bellet, Tue Dec 9 22:25:22 2025