A weak hashing algorithm and small sizes of seeds/secrets...
Moderate severity
Unreviewed
Published
Jan 30, 2025
to the GitHub Advisory Database
•
Updated Jan 30, 2025
Description
Published by the National Vulnerability Database
Jan 30, 2025
Published to the GitHub Advisory Database
Jan 30, 2025
Last updated
Jan 30, 2025
A weak hashing algorithm and small sizes of seeds/secrets in Google's gVisor allowed for a remote attacker to calculate a local IP address and a per-boot identifier that could aid in tracking of a device in certain circumstances.
References