In the cron package through 3.0pl1-128 on Debian, and through 3.0pl1-128ubuntu2 on Ubuntu, the postinst maintainer script allows for group-crontab-to-root privilege escalation via symlink attacks against unsafe usage of the chown and chmod programs.
{ "ubuntu_priority": "low" }
{ "ubuntu_priority": "low", "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_name": "cron", "binary_version": "3.0pl1-128ubuntu2+esm2" }, { "binary_name": "cron-dbgsym", "binary_version": "3.0pl1-128ubuntu2+esm2" } ] }
{ "ubuntu_priority": "low", "availability": "No subscription required", "binaries": [ { "binary_name": "cron", "binary_version": "3.0pl1-128.1ubuntu1.2" }, { "binary_name": "cron-dbgsym", "binary_version": "3.0pl1-128.1ubuntu1.2" } ] }
{ "ubuntu_priority": "low", "availability": "No subscription required", "binaries": [ { "binary_name": "cron", "binary_version": "3.0pl1-134ubuntu1" }, { "binary_name": "cron-dbgsym", "binary_version": "3.0pl1-134ubuntu1" } ] }