Severity: Unknown
Affected Package: kernel
Summary: Kernel use-after-free bug in the TIOCNOTTY handler
The implementation of TIOCNOTTY failed to clear a back-pointer from the structure representing the controlling terminal to the calling process' session. If the invoking process then exits, the terminal structure may end up containing a pointer to freed memory. A malicious process can abuse the dangling pointer to grant itself root privileges.
No specific recommendations provided.
Aliases: CVE-2026-5398
Published: April 21, 2026
Last Modified: April 21, 2026