SUSE-FU-2024:0839-2: moderate: Feature update for flatpak, libostree, bubblewrap

SLE-UPDATES null at suse.de
Mon Aug 19 12:39:13 UTC 2024



# Feature update for flatpak, libostree, bubblewrap

Announcement ID: SUSE-FU-2024:0839-2  
Rating: moderate  
References:

  
Affected Products:

  * Basesystem Module 15-SP6
  * Desktop Applications Module 15-SP6
  * openSUSE Leap 15.6
  * SUSE Linux Enterprise Desktop 15 SP6
  * SUSE Linux Enterprise Real Time 15 SP6
  * SUSE Linux Enterprise Server 15 SP6
  * SUSE Linux Enterprise Server for SAP Applications 15 SP6

  
  
An update that can now be installed.

## Description:

This update for flatpak, libostree, bubblewrap fixes the following issues:

  * Update flatpak to version 1.14.5:
  * Features:
    * Stop http transfers if a download in progress becomes very slow
    * Add anchors to link to sections of flatpak-metadata documentation
  * Bug fixes:
    * Avoid warnings processing symbolic links with GLib >= 2.77.0
    * Fix installation errors with libostree 2023.4
    * Show AppStream metadata in flatpak remote-info as intended
    * Don't let Flatpak apps inherit VK_DRIVER_FILES or VK_ICD_FILENAMES from the host
    * Fix build failure with prereleases of libappstream 0.17.x
    * Forward-compatibility with libappstream 1.0
    * Fix a memory leak
    * Fix compiler warnings
    * Clean up /var/tmp/flatpak-cache-* directories on boot
    * Don't force GIO_USE_VFS=local for programs launched via flatpak-spawn
    * Clarify documentation for D-Bus name ownership
  * Update libostree to version 2023.7:
  * Support for a "transient etc"
  * HTTP layer now retries requests by default
  * Fixed trying to fetch "loose" objects even when we were doing a delta pull
  * Fix variety of clang-analyzer fixes
  * Update bubblewrap to v0.8.0:
  * Add --disable-userns option to prevent the sandbox from creating its own
    nested user namespace
  * Add --assert-userns-disabled option to check that an existing userns was
    created with --disable-userns
  * Give a clearer error message if the kernel doesn't have CONFIG_SECCOMP and
    CONFIG_SECCOMP_FILTER

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * openSUSE Leap 15.6  
    zypper in -t patch openSUSE-SLE-15.6-2024-839=1

  * Basesystem Module 15-SP6  
    zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2024-839=1

  * Desktop Applications Module 15-SP6  
    zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-839=1

## Package List:

  * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
    * bubblewrap-0.8.0-150500.3.3.1
    * libostree-debugsource-2023.7-150500.3.6.1
    * bubblewrap-debuginfo-0.8.0-150500.3.3.1
    * libostree-2023.7-150500.3.6.1
    * bubblewrap-debugsource-0.8.0-150500.3.3.1
    * libostree-debuginfo-2023.7-150500.3.6.1
    * libostree-1-1-debuginfo-2023.7-150500.3.6.1
    * libostree-1-1-2023.7-150500.3.6.1
    * libostree-devel-2023.7-150500.3.6.1
    * bubblewrap-zsh-completion-0.8.0-150500.3.3.1
    * typelib-1_0-OSTree-1_0-2023.7-150500.3.6.1
  * openSUSE Leap 15.6 (noarch)
    * libostree-grub2-2023.7-150500.3.6.1
  * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
    * bubblewrap-0.8.0-150500.3.3.1
    * libostree-debugsource-2023.7-150500.3.6.1
    * bubblewrap-debuginfo-0.8.0-150500.3.3.1
    * bubblewrap-debugsource-0.8.0-150500.3.3.1
    * libostree-debuginfo-2023.7-150500.3.6.1
    * libostree-1-1-debuginfo-2023.7-150500.3.6.1
    * libostree-1-1-2023.7-150500.3.6.1
    * bubblewrap-zsh-completion-0.8.0-150500.3.3.1
  * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
    * libostree-2023.7-150500.3.6.1
    * libostree-devel-2023.7-150500.3.6.1
    * libostree-debuginfo-2023.7-150500.3.6.1
    * libostree-debugsource-2023.7-150500.3.6.1
    * typelib-1_0-OSTree-1_0-2023.7-150500.3.6.1

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20240819/3c520689/attachment.htm>


More information about the sle-updates mailing list