Rocky Linux: RLSA-2021:4622 freerdp security update
Summary
An update for freerdp is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. The xfreerdp client can connect to RDP servers such as Microsoft Windows machines, xrdp, and VirtualBox. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
RPMs
freerdp-2.2.0-7.el8_5.aarch64.rpm
freerdp-2.2.0-7.el8_5.src.rpm
freerdp-2.2.0-7.el8_5.x86_64.rpm
freerdp-debuginfo-2.2.0-7.el8_5.aarch64.rpm
freerdp-debuginfo-2.2.0-7.el8_5.i686.rpm
freerdp-debuginfo-2.2.0-7.el8_5.x86_64.rpm
freerdp-debugsource-2.2.0-7.el8_5.aarch64.rpm
freerdp-debugsource-2.2.0-7.el8_5.x86_64.rpm
freerdp-devel-2.2.0-7.el8_5.aarch64.rpm
freerdp-devel-2.2.0-7.el8_5.i686.rpm
freerdp-devel-2.2.0-7.el8_5.x86_64.rpm
freerdp-libs-2.2.0-7.el8_5.aarch64.rpm
freerdp-libs-2.2.0-7.el8_5.i686.rpm
freerdp-libs-2.2.0-7.el8_5.x86_64.rpm
freerdp-libs-debuginfo-2.2.0-7.el8_5.aarch64.rpm
freerdp-libs-debuginfo-2.2.0-7.el8_5.i686.rpm
freerdp-libs-debuginfo-2.2.0-7.el8_5.x86_64.rpm
libwinpr-2.2.0-7.el8_5.aarch64.rpm
libwinpr-2.2.0-7.el8_5.i686.rpm
libwinpr-2.2.0-7.el8_5.x86_64.rpm
libwinpr-debuginfo-2.2.0-7.el8_5.aarch64.rpm
libwinpr-debuginfo-2.2.0-7.el8_5.i686.rpm
libwinpr-debuginfo-2.2.0-7.el8_5.x86_64.rpm
libwinpr-devel-2.2.0-7.el8_5.aarch64.rpm
libwinpr-devel-2.2.0-7.el8_5.i686.rpm
libwinpr-devel-2.2.0-7.el8_5.x86_64.rpm
References
No References
CVEs
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41159.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41160.json
Fixes
https://bugzilla.redhat.com/show_bug.cgi?id=
https://bugzilla.redhat.com/show_bug.cgi?id=