Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 27 Apr 2016 12:30:57 +1000
From: Wade Mealing <>
Subject: CVE-2016-0723: Linux kernel: Kernel memory disclosure.

A flaw was discovered in the linux kernel tty subsystem which allows
for disclosure of uncontrolled memory location and possible kernel
panic. The information leak is caused by a race condition when
attempting to set and read the tty line discipline.

An attacker can use the TIOCSETD (via tty_set_ldisc ) to switch to a
new line discipline, a concurrent call to with a TIOCGETD ioctl
performs a read on a given tty may be able to access memory previously
 allocated.  Up to 4 bytes may leaked to userspace when querying the
line discipline.


Wade Mealing
Red Hat Product Security

Upstream fix:

Upstream discussion:

Red Hat bugzilla:

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ