xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.
invisible-island.net/xterm/xterm.log.html
lists.debian.org/debian-lts-announce/2022/02/msg00007.html
lists.fedoraproject.org/archives/list/[email protected]/message/BP5Y4O7WBNLV24D22E6LE7RQFYOUVD2U/
lists.fedoraproject.org/archives/list/[email protected]/message/T4CWYYEBT6AJRJBBQU2KLUOQDHRM7WAV/
security.gentoo.org/glsa/202208-22
twitter.com/nickblack/status/1487731459398025216
www.openwall.com/lists/oss-security/2022/01/30/2
www.openwall.com/lists/oss-security/2022/01/30/3