Impact
A flaw in ubuntu-desktop-provision allows the inclusion of a user’s password hash in crash‑report logs when an installation fails and a bug report is submitted to Launchpad. The weakness stems from improper handling of credential information during crash reporting, corresponding to CWE‑1258. If the log files become accessible, an attacker could obtain hashed credentials, compromising account security.
Affected Systems
Canonical Ubuntu’s ubuntu‑desktop‑provision package, version 24.04.4, is affected on Ubuntu 24.04 LTS desktop installations. No other versions or platforms are listed in the advisory.
Risk and Exploitability
The metric score of 2.7 indicates low severity. No exploitation probability score is available, and the vulnerability is not listed in the KEV catalog. The attack requires a user to trigger a crash during installation, submit a bug report, and then obtain the attached log file from Launchpad or the local system. Thus, exploitation depends on obtaining the crash log, which may be restricted to the local user or an entity with access to the Launchpad account. The likely attack vector is therefore indirect and limited.
OpenCVE Enrichment