CVE-2018-16738

NameCVE-2018-16738
Descriptiontinc 1.0.30 through 1.0.34 has a broken authentication protocol, although there is a partial mitigation. This is fixed in 1.1.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-4312-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tinc (PTS)bookworm, bullseye1.0.36-2fixed
sid, trixie1.0.36-2.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tincsourcejessie(not affected)
tincsourcestretch1.0.31-1+deb9u1DSA-4312-1
tincsource(unstable)1.0.35-1

Notes

[jessie] - tinc <not-affected> (Only affects 1.0.30 to 1.0.34)
http://www.tinc-vpn.org/git/browse?p=tinc;a=commit;h=d3297fbd3b8c8c8a4661f5bbf89aca5cacba8b5a
This CVE is specific for tinc versions which did had mitigations put
in place for the Sweet32 attack in tinc 1.0.30.

Search for package or bug name: Reporting problems