In the cron package through 3.0pl1-128 on Debian, and through 3.0pl1-128ubuntu2 on Ubuntu, the postinst maintainer script allows for group-crontab-to-root privilege escalation via symlink attacks against unsafe usage of the chown and chmod programs.
{ "binaries": [ { "binary_version": "3.0pl1-124ubuntu2", "binary_name": "cron" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-9525.json"
{ "binaries": [ { "binary_version": "3.0pl1-128ubuntu2+esm2", "binary_name": "cron" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "binaries": [ { "binary_version": "3.0pl1-128.1ubuntu1.2", "binary_name": "cron" } ], "availability": "No subscription required" }