xterm-366-12.el9_6
エラータID: AXSA:2025-10760:02
Release date:
Wednesday, August 20, 2025 - 13:08
Subject:
xterm-366-12.el9_6
Affected Channels:
MIRACLE LINUX 9 for x86_64
Severity:
Moderate
Description:
The xterm program is a terminal emulator for the X Window System. It provides DEC VT102 and Tektronix 4014 compatible terminals for programs that can't use the window system directly.
Security Fix(es):
* xterm: Buffer overflow in set_sixel in graphics_sixel.c (CVE-2022-24130)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2022-24130
xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.
Solution:
Update packages.
CVEs:
CVE-2022-24130
xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.
xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.
Additional Info:
N/A
Download:
SRPMS
- xterm-366-12.el9_6.src.rpm
MD5: 4206b72817067f97aaa2000da245156f
SHA-256: 6225ff6ac399a2af1bed1b78bb611c639f83400d7f0b499a31514be147eb0678
Size: 1.40 MB
Asianux Server 9 for x86_64
- xterm-366-12.el9_6.x86_64.rpm
MD5: d2f258de0a956b98d6de6e9b399287ee
SHA-256: 283710d0f9fc5f03c87a4d76ee103afc81f48d0ca76861e40cef91d083d67673
Size: 613.33 kB - xterm-resize-366-12.el9_6.x86_64.rpm
MD5: c78fb635af15dd57d36f3724fe4df1d7
SHA-256: aa9f3a130bd8497ff01e37c8eb6079c2b0173321d0eda6b634d2ee93696a7737
Size: 19.20 kB