2025-01-30 19:12:27
PUBLISHED
A weak hashing algorithm and small sizes of seeds/secrets in Googles gVisor allowed for a remote attacker to calculate a local IP address and a per-boot identifier that could aid in tracking of a device in certain circumstances.