{"id":"CVE-2016-0723","details":"Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel through 4.4.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call.","modified":"2026-03-15T21:49:55.011979Z","published":"2016-02-08T03:59:09.840Z","related":["SUSE-SU-2016:0585-1","SUSE-SU-2016:0785-1","SUSE-SU-2016:0911-1","SUSE-SU-2016:1102-1","SUSE-SU-2016:1203-1","SUSE-SU-2016:1764-1","SUSE-SU-2016:2074-1","openSUSE-SU-2024:10128-1"],"references":[{"type":"WEB","url":"http://www.securitytracker.com/id/1035695"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/82950"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html"},{"type":"WEB","url":"https://security-tracker.debian.org/tracker/CVE-2016-0723"},{"type":"WEB","url":"https://support.f5.com/csp/article/K43650115"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176464.html"},{"type":"WEB","url":"http://source.android.com/security/bulletin/2016-07-01.html"},{"type":"ADVISORY","url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5c17c861a357e9458001f021a7afa7aab9937439"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2930-2"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2948-2"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3448"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3503"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2929-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2929-2"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2967-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2930-3"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2932-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2948-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2967-2"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2930-1"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1296253"},{"type":"FIX","url":"https://github.com/torvalds/linux/commit/5c17c861a357e9458001f021a7afa7aab9937439"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-0723.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"4.4.1"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H"}]}