Descriptiontinc 1.0.30 through 1.0.34 has a broken authentication protocol, although there is a partial mitigation. This is fixed in 1.1.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tinc (PTS)jessie1.0.24-2.1fixed
jessie (security)1.0.24-2.1+deb8u1fixed
stretch (security), stretch1.0.31-1+deb9u1fixed
buster, sid1.0.35-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tincsourcejessie(not affected)


[jessie] - tinc <not-affected> (Only affects 1.0.30 to 1.0.34);a=commit;h=d3297fbd3b8c8c8a4661f5bbf89aca5cacba8b5a
This CVE is specific for tinc versions which did had mitigations put
in place for the Sweet32 attack in tinc 1.0.30.

Search for package or bug name: Reporting problems