We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A weak hashing algorithm and small sizes of seeds/secrets in Google's gVisor allowed for a remote attacker to calculate a local IP address and a per-boot identifier that could aid in tracking of a device in certain circumstances.
Reserved 2024-10-16 | Published 2025-01-30 | Updated 2025-02-06 | Assigner GoogleAmit Klein (Hebrew University of Jerusalem)
Inon Kaplan (Independent researcher)
Ron Even (Independent researcher)
github.com/...ommit/f956b5ac17ae1f60a4d21999b59ba18c55f86d56
github.com/...ommit/e54bfde79278cafadedbf73c68ee10cb5982f2af
github.com/...ommit/83f75082e5b03fafca9201d9d9939028f712b0b2
Support options