A weak hashing algorithm and small sizes of seeds/secrets in Google's gVisor allowed for a remote attacker to calculate a local IP address and a per-boot identifier that could aid in tracking of a device in certain circumstances.
{
"versions": [
{
"introduced": "0"
},
{
"fixed": "20231030.0"
},
{
"introduced": "20231106.0"
},
{
"fixed": "20231204.0"
}
]
}