Debian Package Tracker
Register | Log in
Subscribe

libcoap3

Choose email to subscribe with

general
  • source: libcoap3 (main)
  • version: 4.3.5-1
  • maintainer: Debian IoT Maintainers (archive) (DMD)
  • uploaders: Thorsten Alteholz [DMD]
  • arch: all any
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 4.3.1-1
  • stable: 4.3.4-1.1
  • testing: 4.3.5-1
  • unstable: 4.3.5-1
versioned links
  • 4.3.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.3.4-1.1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.3.5-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libcoap3-bin
  • libcoap3-dev
  • libcoap3-doc
  • libcoap3t64
action needed
lintian reports 3 warnings normal
Lintian reports 3 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2024-03-01 Last update: 2024-03-01 12:04
No known security issue in trixie wishlist

There is 1 open security issue in trixie.

1 ignored issue:
  • CVE-2024-46304: A NULL pointer dereference in libcoap v4.3.5-rc2 and below allows a remote attacker to cause a denial of service via the coap_handle_request_put_block function in src/coap_block.c.
Created: 2024-01-28 Last update: 2025-09-06 12:03
No known security issue in bookworm wishlist

There are 3 open security issues in bookworm.

3 ignored issues:
  • CVE-2023-30362: Buffer Overflow vulnerability in coap_send function in libcoap library 4.3.1-103-g52cfd56 fixed in 4.3.1-120-ge242200 allows attackers to obtain sensitive information via malformed pdu.
  • CVE-2024-31031: An issue in `coap_pdu.c` in libcoap 4.3.4 allows attackers to cause undefined behavior via a sequence of messages leading to unsigned integer overflow.
  • CVE-2024-46304: A NULL pointer dereference in libcoap v4.3.5-rc2 and below allows a remote attacker to cause a denial of service via the coap_handle_request_put_block function in src/coap_block.c.
Created: 2023-07-07 Last update: 2025-09-06 12:03
news
[rss feed]
  • [2025-08-31] libcoap3 4.3.5-1 MIGRATED to testing (Debian testing watch)
  • [2025-08-30] Accepted libcoap3 4.3.4-1.1+deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Thorsten Alteholz)
  • [2025-08-26] Accepted libcoap3 4.3.5-1 (source) into unstable (Thorsten Alteholz)
  • [2024-05-03] libcoap3 4.3.4-1.1 MIGRATED to testing (Debian testing watch)
  • [2024-03-17] libcoap3 REMOVED from testing (Debian testing watch)
  • [2024-02-29] Accepted libcoap3 4.3.4-1.1 (source) into unstable (Benjamin Drung)
  • [2024-01-31] Accepted libcoap3 4.3.4-1.1~exp1 (source) into experimental (Steve Langasek)
  • [2023-11-03] libcoap3 4.3.4-1 MIGRATED to testing (Debian testing watch)
  • [2023-10-29] Accepted libcoap3 4.3.4-1 (source) into unstable (Carsten Schoenert)
  • [2023-09-22] libcoap3 4.3.3-1 MIGRATED to testing (Debian testing watch)
  • [2023-09-16] Accepted libcoap3 4.3.3-1 (source) into unstable (Carsten Schoenert)
  • [2023-07-13] libcoap3 4.3.1-2 MIGRATED to testing (Debian testing watch)
  • [2023-07-08] Accepted libcoap3 4.3.1-2 (source) into unstable (Carsten Schoenert)
  • [2022-12-03] libcoap3 4.3.1-1 MIGRATED to testing (Debian testing watch)
  • [2022-11-28] Accepted libcoap3 4.3.1-1 (source) into unstable (Carsten Schoenert)
  • [2021-10-22] libcoap3 4.3.0-2 MIGRATED to testing (Debian testing watch)
  • [2021-10-17] Accepted libcoap3 4.3.0-2 (source) into unstable (Carsten Schoenert)
  • [2021-09-23] libcoap3 4.3.0-1 MIGRATED to testing (Debian testing watch)
  • [2021-09-17] Accepted libcoap3 4.3.0-1 (source) into unstable (Carsten Schoenert)
  • [2021-08-16] Accepted libcoap3 4.3.0-1~exp1 (source amd64 all) into experimental, experimental (Debian FTP Masters) (signed by: Carsten Schoenert)
  • [2021-08-16] Accepted libcoap3 4.3.0~rc2-1 (source amd64 all) into experimental, experimental (Debian FTP Masters) (signed by: Carsten Schoenert)
bugs [bug history graph]
  • all: 1
  • RC: 0
  • I&N: 0
  • M&W: 1
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 3)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 4.3.4-1.1build4

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing