In 1985, John Bruner sent an email to the Security Digest mailing list, about TIOCSTI-related security issues. Four years later, Ken Stauffer and Theo de Raadt wrote a famous exploit for SunOS based on it. In 1997, halflife wrote a Phrack article mentionning how TIOCSTI can be abused on Linux too. In 2012, halfdog wrote a comprehensive article on the topic.
In February 2016, spender added a
GRKERNSEC_HARDEN_TTY option to grsecurity.
Since June 2016, thanks to Theo de Raadt, TIOCSTI is a no-op in OpenBSD.
This is a low-hanging hole that should be now closed in every UNIX.