Wind River Support Network


LIN8-4141 : MD5 hash algorithm - Additional Information to reported security weaknesses

Created: Jul 8, 2016    Updated: Dec 3, 2018
Resolved Date: Jul 14, 2016
Found In Version:
Fix Version:
Severity: Standard
Applicable for: Wind River Linux 8
Component/s: Userspace


Weaknesses in the MD5 algorithm allow for collisions in output. As a result, attackers can generate cryptographic tokens or other data that illegitimately appear to be authentic.

Reference Link:

Steps to Reproduce


Other Downloads

Live chat