CVE-2024-10026

A weak hashing algorithm and small sizes of seeds/secrets in Google's gVisor allowed for a remote attacker to calculate a local IP address and a per-boot identifier that could aid in tracking of a device in certain circumstances.

Credits

Amit Klein (Hebrew University of Jerusalem)
Inon Kaplan (Independent researcher)
Ron Even (Independent researcher)

References