Description
A weak hashing algorithm and small sizes of seeds/secrets in Google's gVisor allowed for a remote attacker to calculate a local IP address and a per-boot identifier that could aid in tracking of a device in certain circumstances.
Problem types
Product status
Release 20241028.0
Credits
Amit Klein (Hebrew University of Jerusalem)
Inon Kaplan (Independent researcher)
Ron Even (Independent researcher)
References
github.com/...ommit/f956b5ac17ae1f60a4d21999b59ba18c55f86d56
github.com/...ommit/e54bfde79278cafadedbf73c68ee10cb5982f2af
github.com/...ommit/83f75082e5b03fafca9201d9d9939028f712b0b2
www.ndss-symposium.org/wp-content/uploads/2025-122-paper.pdf