vulnerability
Red Hat: CVE-2022-45063: xterm: code execution via OSC 50 input sequences (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:H/Au:N/C:C/I:N/A:C) | Nov 10, 2022 | May 15, 2025 | May 15, 2025 |
Severity
7
CVSS
(AV:N/AC:H/Au:N/C:C/I:N/A:C)
Published
Nov 10, 2022
Added
May 15, 2025
Modified
May 15, 2025
Description
xterm before 375 allows code execution via font ops, e.g., because an OSC 50 response may have Ctrl-g and therefore lead to command execution within the vi line-editing mode of Zsh. NOTE: font ops are not allowed in the xterm default configurations of some Linux distributions.
Solution(s)
redhat-upgrade-xtermredhat-upgrade-xterm-debuginforedhat-upgrade-xterm-debugsourceredhat-upgrade-xterm-resizeredhat-upgrade-xterm-resize-debuginfo
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.