A weak hashing algorithm and small sizes of seeds/secrets in Google's gVisor allowed for a remote attacker to calculate a local IP address and a per-boot identifier that could aid in tracking of a device in certain circumstances.
References
| Link | Resource |
|---|---|
| https://github.com/google/gvisor/commit/83f75082e5b03fafca9201d9d9939028f712b0b2 | Patch |
| https://github.com/google/gvisor/commit/e54bfde79278cafadedbf73c68ee10cb5982f2af | Patch |
| https://github.com/google/gvisor/commit/f956b5ac17ae1f60a4d21999b59ba18c55f86d56 | Patch |
| https://www.ndss-symposium.org/wp-content/uploads/2025-122-paper.pdf | Exploit Third Party Advisory Technical Description |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-01-30 20:15
Updated : 2025-07-31 18:33
NVD link : CVE-2024-10026
Mitre link : CVE-2024-10026
CVE.ORG link : CVE-2024-10026
JSON object : View
Products Affected
- gvisor
