CVE-2016-2781
Publication date 7 February 2017
Last updated 31 March 2026
Ubuntu priority
Cvss 3 Severity Score
Description
chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| coreutils | 25.10 questing | Ignored |
| 24.04 LTS noble | Ignored | |
| 22.04 LTS jammy | Ignored | |
| 20.04 LTS focal | Ignored end of standard support, was deferred | |
| 18.04 LTS bionic | Ignored end of standard support, was deferred | |
| 16.04 LTS xenial | Ignored end of standard support, was deferred | |
| 14.04 LTS trusty | Ignored end of standard support | |
Notes
mdeslaur
as of 2026-03-31, there is no viable solution for this issue. We will not be fixing this CVE in Ubuntu, marking as ignored.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Local |
| Attack complexity | Low |
| Privileges required | Low |
| User interaction | None |
| Scope | Changed |
| Confidentiality | None |
| Integrity impact | High |
| Availability impact | None |
| Vector | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N |