CVE-2022-24130
NixOS vulnerability analysis and mitigation

Overview

CVE-2022-24130 affects xterm through Patch 370, when Sixel support is enabled. The vulnerability was discovered on January 30, 2022, and allows attackers to trigger a buffer overflow in setsixel function within graphicssixel.c via crafted text. The vulnerability affects multiple versions of xterm across various Linux distributions including Debian, Fedora, and Gentoo (Debian LTS, Fedora Update, Gentoo GLSA).

Technical details

The vulnerability occurs in the setsixel function within graphicssixel.c when processing Sixel graphics data. The issue allows for an invalid write of size 2 that can lead to memory corruption. The bug was discovered when a corrupted sixel input caused the program to attempt writing to an invalid memory address (0xFFFFFFFF0941EFB8). The vulnerability can be triggered by crafting specific Sixel input sequences that cause context->col to wrap, resulting in out-of-bounds writes to graphic->pixels (OSS Security, OSS Security POC).

Impact

When successfully exploited, this vulnerability can result in denial of service through program crashes. The buffer overflow could potentially lead to memory corruption and program termination with a SIGSEGV signal (Gentoo GLSA, OSS Security).

Mitigation and workarounds

The vulnerability has been fixed in subsequent versions of xterm. Users are advised to upgrade to xterm versions >= 371 for Gentoo, version 327-2+deb9u2 for Debian 9 stretch, and version 370-3 for Fedora. If immediate upgrading is not possible, users can disable Sixel support as a temporary workaround (Gentoo GLSA, Debian LTS, Fedora Update).

Community reactions

The vulnerability was initially discovered by Nick Black while working on Notcurses bug #2573. It was promptly reported to Thomas Dickey, the maintainer of xterm. The discovery was first shared on Twitter and then formally reported through the oss-security mailing list (OSS Security).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-48606HIGH7.8
  • NixOSNixOS
  • android
NoNoDec 08, 2025
CVE-2025-48625HIGH7
  • NixOSNixOS
  • android
NoNoDec 08, 2025
CVE-2025-48608MEDIUM5.5
  • NixOSNixOS
  • android
NoNoDec 08, 2025
CVE-2025-48569MEDIUM5.5
  • NixOSNixOS
  • android
NoNoDec 08, 2025
CVE-2025-65799MEDIUM4.3
  • NixOSNixOS
  • memos
NoYesDec 08, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management