This doc is about finding a collision in a 128-bit hashing-scheme.
One has to consider, whether we are dealing with an attacker that seeks to find collisions, or whether we have regular users that could just come up with a same UUID v5 by accident.
For the attacker scenario, given that SHA-1 is being used for UUID v5 and SHA-1 is cryptographically broken,