<div class="container">
<h1>Recommended update for bubblewrap, flatpak, wayland-protocols</h1>
<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-RU-2025:0145-1</td>
</tr>
<tr>
<th>Release Date:</th>
<td>2025-01-16T14:27:50Z</td>
</tr>
<tr>
<th>Rating:</th>
<td>moderate</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1188902">bsc#1188902</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1212476">bsc#1212476</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216320">bsc#1216320</a>
</li>
<li style="display: inline;">
<a href="https://jira.suse.com/browse/PED-10504">jsc#PED-10504</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">
<li class="list-group-item">Basesystem Module 15-SP6</li>
<li class="list-group-item">Desktop Applications Module 15-SP6</li>
<li class="list-group-item">openSUSE Leap 15.5</li>
<li class="list-group-item">openSUSE Leap 15.6</li>
<li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP6</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise High Performance Computing LTSS 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP6</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP5 LTSS</li>
<li class="list-group-item">SUSE Linux Enterprise Server 15 SP6</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP5</li>
<li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP6</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>An update that contains one feature and has three fixes can now be installed.</p>
<h2>Description:</h2>
<p>This update for bubblewrap, flatpak updates flatpak to 1.16.0.</p>
<p>flatpak changes:</p>
<ul>
<li>
<p>Update to version 1.16.0:</p>
</li>
<li>
<p>Bug fixes:</p>
<ul>
<li>Update libglnx to 2024-12-06:</li>
</ul>
<p>. Fix an assertion failure if creating a parent directory
encounters a dangling symlink.
. Fix a Meson warning.
. Don't emit terminal progress indicator escape sequences by
default. They are interpreted as notifications by some
terminal emulators.
- Fix introspection annotations in libflatpak.</p>
</li>
<li>
<p>Enhancements:</p>
<ul>
<li>Add the FLATPAK_TTY_PROGRESS environment variable, which
re-enables the terminal progress indicator escape sequences
added in 1.15.91.</li>
<li>Document the FLATPAK_FANCY_OUTPUT environment variable, which
allows disabling the fancy formatting when outputting to a
terminal.</li>
</ul>
</li>
</ul>
<p>Update to version 1.15.91 (unstable):</p>
<ul>
<li>
<p>Enhancements:</p>
<ul>
<li>Add the FLATPAK_DATA_DIR environment variable, which allows
overriding at runtime the data directory location that
Flatpak uses to search for configuration files such as
remotes. This is useful for running tests, and for when
installing using Flatpak in a chroot.</li>
<li>Add a FLATPAK_DOWNLOAD_TMPDIR variable. This allows using
download directories other than /var/tmp.</li>
<li>Emit progress escape sequence. This can be used by terminal
emulators to detect and display progress of Flatpak
operations on their graphical user interfaces.</li>
</ul>
</li>
<li>
<p>Bug fixes:</p>
<ul>
<li>Install missing test data. This should fix "as-installed"
tests via ginsttest-runner, used for example in Debian's
autopkgtest framework.</li>
<li>Unify and improve how the Wayland socket is passed to the
sandboxed app. This should fix a regression that is triggered
by compositors that both implement the security-context-v1
protocol, and sets the WAYLAND_DISPLAY environment variable
when launching Flatpak apps.</li>
<li>Fix the plural form of a translatable string.</li>
</ul>
</li>
</ul>
<p>Update to version 1.15.12:</p>
<ul>
<li>Return to using the process ID of the Flatpak app in the cgroup
name. Using the instance ID in 1.15.11 caused crashes when
installing apps, extensions or runtimes that use the "extra
data" mechanism, which does not set up an instance ID.</li>
</ul>
<p>Changes from version 1.15.11:</p>
<ul>
<li>
<p>Dependencies:</p>
<ul>
<li>In distributions that compile Flatpak to use a separate
xdg-dbus-proxy executable, version 0.1.6 is recommended (but
not required).</li>
<li>The minimum xdg-dbus-proxy continues to be 0.1.0.</li>
</ul>
</li>
<li>
<p>Enhancements:</p>
<ul>
<li>Allow applications like WebKit to connect the AT-SPI
accessibility tree of processes in a sub-sandbox with the
tree in the main process.
. New sandboxing parameter flatpak run --a11y-own-name, which
is like --own-name but for the accessibility bus.
. flatpak-portal API v7: add new sandbox-a11y-own-names
option, which accepts names matching ${FLATPAK_ID}.<em>
. Apps may call the org.a11y.atspi.Socket.Embedded method on
names matching ${FLATPAK_ID}.Sandboxed.</em> by default
. flatpak run -vv $app_id shows all applicable sandboxing
parameters and their source, including overrides, as debug
messages</li>
<li>Introduce USB device listing
. Apps can list which USB devices they want to access ahead
of time by using the --usb parameter. Check the manpages
for the more information about the accepted syntax.
. Denying access to USB devices is also possible with the
--no-usb parameter. The syntax is equal to --usb.
. Both options merely store metadata, and aren't used by
Flatpak itself. This metadata is intended to be used by the
(as of now, still in progress) USB portal to decide which
devices the app can enumerate and request access.</li>
<li>Add support for KDE search completion</li>
<li>Use the instance id of the Flatpak app as part of the cgroup
name. This better matches the naming conventions for cgroup.</li>
</ul>
</li>
<li>
<p>Bug fixes:</p>
<ul>
<li>Update libglnx to 2024-08-23</li>
<li>fix build in environments that use -Werror=return-type, such
as openSUSE Tumbleweed</li>
<li>add a fallback definition for G_PID_FORMAT with older GLib</li>
<li>avoid warnings for g_steal_fd() with newer GLib</li>
<li>improve compatibility of g_closefrom() backport with newer
GLib</li>
<li>Update meson wrap file for xdg-dbus-proxy to version 0.1.6:</li>
<li>compatibility with D-Bus implementations that pipeline the
authentication handshake, such as sd-bus and zbus</li>
<li>compatibility with D-Bus implementations that use
non-consecutive serial numbers, such as godbus and zbus</li>
<li>broadcast signals can be allowed without having to add TALK
permission</li>
<li>fix memory leaks</li>
</ul>
</li>
<li>
<p>Internal changes:</p>
<ul>
<li>Better const-correctness</li>
<li>Fix a shellcheck warning in the tests</li>
</ul>
</li>
<li>
<p>add weak dep on p11-kit-server for certificate transfer (boo#1188902)</p>
</li>
<li>disable parental controls for now by using '-Dmalcontent=disabled', to work around
issues with xdg-desktop-portal</li>
</ul>
<p>Update to version 1.14.10:</p>
<ul>
<li>Dependencies: In distributions that compile Flatpak to use a
separate bubblewrap (bwrap) executable, either version 0.10.0,
version 0.6.x ≥ 0.6.3, or a version with a backport of the
--bind-fd option is required. These versions add a new feature
which is required by the security fix in this release.</li>
<li>Security fixes: Don't follow symbolic links when mounting
persistent directories (--persist option). This prevents a
sandbox escape where a malicious or compromised app could edit
the symlink to point to a directory that the app should not have
been allowed to read or write. (bsc#1229157, CVE-2024-42472,
GHSA-7hgv-f2j8-xw87)</li>
<li>Documentation: Mark the 1.12.x and 1.10.x branches as
end-of-life (#5352)</li>
<li>Version 1.14.9 was not released due to an incompatibility with
older versions of GLib. Version 1.14.10 replaces it.</li>
</ul>
<p>Update to version 1.14.8:</p>
<ul>
<li>No changes. This release is rolling out to correct mismatching
submodule versions in the release tarball.</li>
</ul>
<p>Update to version 1.14.7:</p>
<ul>
<li>New features: Automatically reload D-Bus session bus
configuration after installing or upgrading apps, to pick up
any exported D-Bus services (#3342)</li>
<li>Bug fixes:<ul>
<li>Expand the list of environment variables that Flatpak apps do
not inherit from the host system (#5765, #5785)</li>
<li>Don't refuse to start apps when there is no D-Bus system bus
available (#5076)</li>
<li>Don't try to repeat migration of apps whose data was migrated
to a new name and then deleted (#5668)</li>
<li>Fix warnings from newer GLib versions (#5660)</li>
<li>Always set the container environment variable (#5610)</li>
<li>In flatpak ps, add xdg-desktop-portal-gnome to the list of
backends we'll use to learn which apps are running in the
background (#5729)</li>
<li>Avoid leaking a temporary variable from
/etc/profile.d/flatpak.sh into the shell environment (#5574)</li>
<li>Avoid undefined behaviour of signed left-shift when storing
object IDs in a hash table (#5738)</li>
<li>Fix Docbook validity in documentation (#5719)</li>
<li>Skip more tests when FUSE isn't available (#5611)</li>
<li>Fix a misleading comment in the test for CVE-2024-32462
(#5779)</li>
</ul>
</li>
<li>Internal changes:<ul>
<li>Fix Github Workflows recipes</li>
</ul>
</li>
</ul>
<p>Update to version 1.14.6:</p>
<ul>
<li>Security fixes:<ul>
<li>Don't allow an executable name to be misinterpreted as a
command-line option for bwrap(1). This prevents a sandbox
escape where a malicious or compromised app could ask
xdg-desktop-portal to generate a .desktop file with access
to files outside the sandbox. (CVE-2024-32462, bsc#1223110)</li>
</ul>
</li>
<li>Other bug fixes:<ul>
<li>Don't parse <developer><name/></developer> as the application
name (#5700)</li>
</ul>
</li>
</ul>
<p>bubblewrap changes:</p>
<p>Update to 0.11.0:</p>
<ul>
<li>New --overlay, --tmp-overlay, --ro-overlay and --overlay-src
options allow creation of overlay mounts. This feature is not
available when bubblewrap is installed setuid.</li>
<li>New --level-prefix option produces output that can be parsed
by tools like logger --prio-prefix and
systemd-cat --level-prefix=1</li>
<li>bug fixes and developer visible changes</li>
</ul>
<p>Update to version v0.10.0:</p>
<ul>
<li>New features: Add the --[ro-]bind-fd option, which can be used
to mount a filesystem represented by a file descriptor without
time-of-check/time-of-use attacks. This is needed when
resolving security issue in Flatpak.
(CVE-2024-42472, bsc#1229157)</li>
<li>Other changes: Fix some confusing syntax in SetupOpFlag (no
functional change).</li>
</ul>
<p>Update to v0.9.0:</p>
<ul>
<li>Build system changed to Meson from Autotools</li>
<li>Add --argv0
https://github.com/containers/bubblewrap/issues/91</li>
<li>--symlink is now idempotent, meaning it succeeds if the symlink
already exists and already has the desired target </li>
<li>Clarify security considerations in documentation</li>
<li>Clarify documentation for --cap-add</li>
<li>Report a better error message if mount(2) fails with ENOSPC</li>
<li>Fix a double-close on error reading from --args, --seccomp or
--add-seccomp-fd argument</li>
<li>Improve memory allocation behaviour</li>
</ul>
<p>wayland-protocols was changed:</p>
<p>Update to version 1.36:</p>
<ul>
<li>xdg-dialog: fix missing namespace in protocol name</li>
</ul>
<p>Changes from version 1.35:</p>
<ul>
<li>cursor-shape-v1: Does not advertises the list of supported cursors</li>
<li>xdg-shell: add missing enum attribute to set_constraint_adjustment</li>
<li>xdg-shell: recommend against drawing decorations when tiled</li>
<li>tablet-v2: mark as stable</li>
<li>staging: add alpha-modifier protocol</li>
</ul>
<p>Update to 1.36:</p>
<ul>
<li>Fix to the xdg dialog protocol</li>
<li>tablet-v2 protocol is now stable</li>
<li>alpha-modifier: new protocol</li>
<li>Bug fix to the cursor shape documentation</li>
<li>The xdg-shell protocol now also explicitly recommends against
drawing decorations outside of the window geometry when tiled</li>
</ul>
<p>Update to 1.34:</p>
<ul>
<li>xdg-dialog: new protocol</li>
<li>xdg-toplevel-drag: new protocol</li>
<li>Fix typo in ext-foreign-toplevel-list-v1</li>
<li>tablet-v2: clarify that name/id events are optional</li>
<li>linux-drm-syncobj-v1: new protocol</li>
<li>linux-explicit-synchronization-v1: add linux-drm-syncobj note</li>
</ul>
<p>Update to version 1.33:</p>
<ul>
<li>xdg-shell: Clarify what a toplevel by default includes</li>
<li>linux-dmabuf: sync changes from unstable to stable</li>
<li>linux-dmabuf: require all planes to use the same modifier</li>
<li>presentation-time: stop referring to Linux/glibc</li>
<li>security-context-v1: Make sandbox engine names use reverse-DNS</li>
<li>xdg-decoration: remove ambiguous wording in configure event</li>
<li>xdg-decoration: fix configure event summary</li>
<li>linux-dmabuf: mark as stable</li>
<li>linux-dmabuf: add note about implicit sync</li>
<li>security-context-v1: Document what can be done with the open
sockets</li>
<li>
<p>security-context-v1: Document out of band metadata for flatpak</p>
</li>
<li>
<p>Use gcc11 in SLE15 in order to fix a ppc64le test that was
failing when built with gcc7 (boo#1216320)</p>
</li>
</ul>
<p>Update to version 1.32:</p>
<ul>
<li>ext-foreign-toplevel-list: new protocol</li>
<li>cursor-shape-v1: new protocol</li>
<li>security-context-v1: new protocol</li>
<li>xdg-shell: add suspended toplevel state</li>
<li>Apart from these new additions, this release also brings the
usual clarifications, cleanups and fixes.</li>
</ul>
<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">
<li class="list-group-item">
openSUSE Leap 15.5
<br/>
<code>zypper in -t patch SUSE-2025-145=1</code>
</li>
<li class="list-group-item">
openSUSE Leap 15.6
<br/>
<code>zypper in -t patch SUSE-2025-145=1 openSUSE-SLE-15.6-2025-145=1</code>
</li>
<li class="list-group-item">
Basesystem Module 15-SP6
<br/>
<code>zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-145=1</code>
</li>
<li class="list-group-item">
Desktop Applications Module 15-SP6
<br/>
<code>zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-145=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
<br/>
<code>zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-145=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
<br/>
<code>zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-145=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Server 15 SP5 LTSS
<br/>
<code>zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-145=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Server for SAP Applications 15 SP5
<br/>
<code>zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-145=1</code>
</li>
</ul>
<h2>Package List:</h2>
<ul>
<li>
openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
<ul>
<li>bubblewrap-0.11.0-150500.3.9.1</li>
<li>bubblewrap-zsh-completion-0.11.0-150500.3.9.1</li>
<li>flatpak-debuginfo-1.16.0-150500.3.15.1</li>
<li>typelib-1_0-Flatpak-1_0-1.16.0-150500.3.15.1</li>
<li>libflatpak0-debuginfo-1.16.0-150500.3.15.1</li>
<li>flatpak-1.16.0-150500.3.15.1</li>
<li>libflatpak0-1.16.0-150500.3.15.1</li>
<li>bubblewrap-debuginfo-0.11.0-150500.3.9.1</li>
<li>bubblewrap-debugsource-0.11.0-150500.3.9.1</li>
<li>flatpak-debugsource-1.16.0-150500.3.15.1</li>
<li>flatpak-devel-1.16.0-150500.3.15.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.5 (noarch)
<ul>
<li>flatpak-zsh-completion-1.16.0-150500.3.15.1</li>
<li>wayland-protocols-devel-1.36-150500.3.3.1</li>
<li>system-user-flatpak-1.16.0-150500.3.15.1</li>
<li>flatpak-remote-flathub-1.16.0-150500.3.15.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
<ul>
<li>flatpak-debugsource-1.16.0-150600.3.6.1</li>
<li>flatpak-devel-1.16.0-150600.3.6.1</li>
<li>flatpak-1.16.0-150600.3.6.1</li>
<li>libflatpak0-1.16.0-150600.3.6.1</li>
<li>typelib-1_0-Flatpak-1_0-1.16.0-150600.3.6.1</li>
<li>libflatpak0-debuginfo-1.16.0-150600.3.6.1</li>
<li>flatpak-debuginfo-1.16.0-150600.3.6.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.6 (noarch)
<ul>
<li>system-user-flatpak-1.16.0-150600.3.6.1</li>
<li>flatpak-remote-flathub-1.16.0-150600.3.6.1</li>
<li>flatpak-zsh-completion-1.16.0-150600.3.6.1</li>
</ul>
</li>
<li>
openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
<ul>
<li>bubblewrap-0.11.0-150500.3.9.1</li>
<li>bubblewrap-debugsource-0.11.0-150500.3.9.1</li>
<li>bubblewrap-zsh-completion-0.11.0-150500.3.9.1</li>
<li>bubblewrap-debuginfo-0.11.0-150500.3.9.1</li>
</ul>
</li>
<li>
Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
<ul>
<li>bubblewrap-0.11.0-150500.3.9.1</li>
<li>bubblewrap-debuginfo-0.11.0-150500.3.9.1</li>
<li>bubblewrap-zsh-completion-0.11.0-150500.3.9.1</li>
<li>bubblewrap-debugsource-0.11.0-150500.3.9.1</li>
</ul>
</li>
<li>
Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
<ul>
<li>flatpak-debugsource-1.16.0-150600.3.6.1</li>
<li>flatpak-devel-1.16.0-150600.3.6.1</li>
<li>flatpak-1.16.0-150600.3.6.1</li>
<li>libflatpak0-1.16.0-150600.3.6.1</li>
<li>typelib-1_0-Flatpak-1_0-1.16.0-150600.3.6.1</li>
<li>libflatpak0-debuginfo-1.16.0-150600.3.6.1</li>
<li>flatpak-debuginfo-1.16.0-150600.3.6.1</li>
</ul>
</li>
<li>
Desktop Applications Module 15-SP6 (noarch)
<ul>
<li>system-user-flatpak-1.16.0-150600.3.6.1</li>
<li>flatpak-remote-flathub-1.16.0-150600.3.6.1</li>
<li>flatpak-zsh-completion-1.16.0-150600.3.6.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64)
<ul>
<li>bubblewrap-0.11.0-150500.3.9.1</li>
<li>bubblewrap-zsh-completion-0.11.0-150500.3.9.1</li>
<li>flatpak-debuginfo-1.16.0-150500.3.15.1</li>
<li>typelib-1_0-Flatpak-1_0-1.16.0-150500.3.15.1</li>
<li>libflatpak0-debuginfo-1.16.0-150500.3.15.1</li>
<li>flatpak-1.16.0-150500.3.15.1</li>
<li>libflatpak0-1.16.0-150500.3.15.1</li>
<li>bubblewrap-debuginfo-0.11.0-150500.3.9.1</li>
<li>bubblewrap-debugsource-0.11.0-150500.3.9.1</li>
<li>flatpak-debugsource-1.16.0-150500.3.15.1</li>
<li>flatpak-devel-1.16.0-150500.3.15.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
<ul>
<li>flatpak-zsh-completion-1.16.0-150500.3.15.1</li>
<li>wayland-protocols-devel-1.36-150500.3.3.1</li>
<li>system-user-flatpak-1.16.0-150500.3.15.1</li>
<li>flatpak-remote-flathub-1.16.0-150500.3.15.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64)
<ul>
<li>bubblewrap-0.11.0-150500.3.9.1</li>
<li>bubblewrap-zsh-completion-0.11.0-150500.3.9.1</li>
<li>flatpak-debuginfo-1.16.0-150500.3.15.1</li>
<li>typelib-1_0-Flatpak-1_0-1.16.0-150500.3.15.1</li>
<li>libflatpak0-debuginfo-1.16.0-150500.3.15.1</li>
<li>flatpak-1.16.0-150500.3.15.1</li>
<li>libflatpak0-1.16.0-150500.3.15.1</li>
<li>bubblewrap-debuginfo-0.11.0-150500.3.9.1</li>
<li>bubblewrap-debugsource-0.11.0-150500.3.9.1</li>
<li>flatpak-debugsource-1.16.0-150500.3.15.1</li>
<li>flatpak-devel-1.16.0-150500.3.15.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
<ul>
<li>flatpak-zsh-completion-1.16.0-150500.3.15.1</li>
<li>wayland-protocols-devel-1.36-150500.3.3.1</li>
<li>system-user-flatpak-1.16.0-150500.3.15.1</li>
<li>flatpak-remote-flathub-1.16.0-150500.3.15.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
<ul>
<li>bubblewrap-0.11.0-150500.3.9.1</li>
<li>bubblewrap-zsh-completion-0.11.0-150500.3.9.1</li>
<li>flatpak-debuginfo-1.16.0-150500.3.15.1</li>
<li>typelib-1_0-Flatpak-1_0-1.16.0-150500.3.15.1</li>
<li>libflatpak0-debuginfo-1.16.0-150500.3.15.1</li>
<li>flatpak-1.16.0-150500.3.15.1</li>
<li>libflatpak0-1.16.0-150500.3.15.1</li>
<li>bubblewrap-debuginfo-0.11.0-150500.3.9.1</li>
<li>bubblewrap-debugsource-0.11.0-150500.3.9.1</li>
<li>flatpak-debugsource-1.16.0-150500.3.15.1</li>
<li>flatpak-devel-1.16.0-150500.3.15.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
<ul>
<li>flatpak-zsh-completion-1.16.0-150500.3.15.1</li>
<li>wayland-protocols-devel-1.36-150500.3.3.1</li>
<li>system-user-flatpak-1.16.0-150500.3.15.1</li>
<li>flatpak-remote-flathub-1.16.0-150500.3.15.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
<ul>
<li>bubblewrap-0.11.0-150500.3.9.1</li>
<li>bubblewrap-zsh-completion-0.11.0-150500.3.9.1</li>
<li>flatpak-debuginfo-1.16.0-150500.3.15.1</li>
<li>typelib-1_0-Flatpak-1_0-1.16.0-150500.3.15.1</li>
<li>libflatpak0-debuginfo-1.16.0-150500.3.15.1</li>
<li>flatpak-1.16.0-150500.3.15.1</li>
<li>libflatpak0-1.16.0-150500.3.15.1</li>
<li>bubblewrap-debuginfo-0.11.0-150500.3.9.1</li>
<li>bubblewrap-debugsource-0.11.0-150500.3.9.1</li>
<li>flatpak-debugsource-1.16.0-150500.3.15.1</li>
<li>flatpak-devel-1.16.0-150500.3.15.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
<ul>
<li>flatpak-zsh-completion-1.16.0-150500.3.15.1</li>
<li>wayland-protocols-devel-1.36-150500.3.3.1</li>
<li>system-user-flatpak-1.16.0-150500.3.15.1</li>
<li>flatpak-remote-flathub-1.16.0-150500.3.15.1</li>
</ul>
</li>
</ul>
<h2>References:</h2>
<ul>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1188902">https://bugzilla.suse.com/show_bug.cgi?id=1188902</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1212476">https://bugzilla.suse.com/show_bug.cgi?id=1212476</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1216320">https://bugzilla.suse.com/show_bug.cgi?id=1216320</a>
</li>
<li>
<a href="https://jira.suse.com/browse/PED-10504">https://jira.suse.com/browse/PED-10504</a>
</li>
</ul>
</div>