Name | CVE-2018-16738 |
Description | tinc 1.0.30 through 1.0.34 has a broken authentication protocol, although there is a partial mitigation. This is fixed in 1.1. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-4312-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
tinc (PTS) | bookworm, bullseye | 1.0.36-2 | fixed |
| sid, trixie | 1.0.36-2.1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
tinc | source | jessie | (not affected) | | | |
tinc | source | stretch | 1.0.31-1+deb9u1 | | DSA-4312-1 | |
tinc | source | (unstable) | 1.0.35-1 | | | |
Notes
[jessie] - tinc <not-affected> (Only affects 1.0.30 to 1.0.34)
http://www.tinc-vpn.org/git/browse?p=tinc;a=commit;h=d3297fbd3b8c8c8a4661f5bbf89aca5cacba8b5a
This CVE is specific for tinc versions which did had mitigations put
in place for the Sweet32 attack in tinc 1.0.30.