xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.
https://www.openwall.com/lists/oss-security/2022/01/30/3
https://www.openwall.com/lists/oss-security/2022/01/30/2
https://twitter.com/nickblack/status/1487731459398025216
https://security.gentoo.org/glsa/202208-22
https://lists.debian.org/debian-lts-announce/2022/02/msg00007.html