CVE-2018-16738

NameCVE-2018-16738
Descriptiontinc 1.0.30 through 1.0.34 has a broken authentication protocol, although there is a partial mitigation. This is fixed in 1.1.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-4312-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tinc (PTS)jessie1.0.24-2.1fixed
jessie (security)1.0.24-2.1+deb8u1fixed
stretch1.0.31-1vulnerable
stretch (security)1.0.31-1+deb9u1fixed
buster, sid1.0.35-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tincsource(unstable)1.0.35-1
tincsourcejessie(not affected)
tincsourcestretch1.0.31-1+deb9u1DSA-4312-1

Notes

[jessie] - tinc <not-affected> (Only affects 1.0.30 to 1.0.34)
http://www.tinc-vpn.org/git/browse?p=tinc;a=commit;h=d3297fbd3b8c8c8a4661f5bbf89aca5cacba8b5a
This CVE is specific for tinc versions which did had mitigations put
in place for the Sweet32 attack in tinc 1.0.30.

Search for package or bug name: Reporting problems