First published: Mon Jan 31 2022(Updated: )
xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Invisible-island Xterm | <=370 | |
Debian | =9.0 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24130 has a high severity due to the potential for buffer overflow exploitation.
CVE-2022-24130 can allow attackers to execute arbitrary code on systems using vulnerable versions of xterm with Sixel support enabled.
To fix CVE-2022-24130, update xterm to a version beyond Patch 370 or disable Sixel support.
CVE-2022-24130 affects all xterm versions up to and including Patch 370.
CVE-2022-24130 impacts xterm on Debian 9.0, Fedora 34, and Fedora 35.