Debian Package Tracker
Register | Log in
Subscribe

libcoap3

Choose email to subscribe with

general
  • source: libcoap3 (main)
  • version: 4.3.5-1
  • maintainer: Debian IoT Maintainers (archive) (DMD)
  • uploaders: Thorsten Alteholz [DMD]
  • arch: all any
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 4.3.1-1
  • stable: 4.3.4-1.1+deb13u1
  • testing: 4.3.5-1
  • unstable: 4.3.5-1
versioned links
  • 4.3.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.3.4-1.1+deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.3.5-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libcoap3-bin
  • libcoap3-dev
  • libcoap3-doc
  • libcoap3t64
action needed
9 security issues in sid high

There are 9 open security issues in sid.

9 important issues:
  • CVE-2025-65493: NULL pointer dereference in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS/TLS connection that triggers BIO_get_data() to return NULL.
  • CVE-2025-65494: NULL pointer dereference in get_san_or_cn_from_cert() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted X.509 certificate that causes sk_GENERAL_NAME_value() to return NULL.
  • CVE-2025-65495: Integer signedness error in tls_verify_call_back() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted TLS certificate that causes i2d_X509() to return -1 and be misused as a malloc() size parameter.
  • CVE-2025-65496: NULL pointer dereference in coap_dtls_generate_cookie() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS handshake that triggers SSL_get_SSL_CTX() to return NULL.
  • CVE-2025-65497: NULL pointer dereference in coap_dtls_generate_cookie() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS handshake that triggers SSL_get_SSL_CTX() to return NULL.
  • CVE-2025-65498: NULL pointer dereference in coap_dtls_generate_cookie() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS handshake that triggers SSL_get_SSL_CTX() to return NULL.
  • CVE-2025-65499: Array index error in tls_verify_call_back() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS handshake that triggers SSL_get_ex_data_X509_STORE_CTX_idx() to return -1.
  • CVE-2025-65500: NULL pointer dereference in coap_dtls_generate_cookie() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS handshake that triggers SSL_get_SSL_CTX() to return NULL.
  • CVE-2025-65501: Null pointer dereference in coap_dtls_info_callback() in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a DTLS handshake where SSL_get_app_data() returns NULL.
Created: 2025-11-24 Last update: 2025-11-26 09:30
9 security issues in forky high

There are 9 open security issues in forky.

9 important issues:
  • CVE-2025-65493: NULL pointer dereference in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS/TLS connection that triggers BIO_get_data() to return NULL.
  • CVE-2025-65494: NULL pointer dereference in get_san_or_cn_from_cert() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted X.509 certificate that causes sk_GENERAL_NAME_value() to return NULL.
  • CVE-2025-65495: Integer signedness error in tls_verify_call_back() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted TLS certificate that causes i2d_X509() to return -1 and be misused as a malloc() size parameter.
  • CVE-2025-65496: NULL pointer dereference in coap_dtls_generate_cookie() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS handshake that triggers SSL_get_SSL_CTX() to return NULL.
  • CVE-2025-65497: NULL pointer dereference in coap_dtls_generate_cookie() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS handshake that triggers SSL_get_SSL_CTX() to return NULL.
  • CVE-2025-65498: NULL pointer dereference in coap_dtls_generate_cookie() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS handshake that triggers SSL_get_SSL_CTX() to return NULL.
  • CVE-2025-65499: Array index error in tls_verify_call_back() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS handshake that triggers SSL_get_ex_data_X509_STORE_CTX_idx() to return -1.
  • CVE-2025-65500: NULL pointer dereference in coap_dtls_generate_cookie() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS handshake that triggers SSL_get_SSL_CTX() to return NULL.
  • CVE-2025-65501: Null pointer dereference in coap_dtls_info_callback() in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a DTLS handshake where SSL_get_app_data() returns NULL.
Created: 2025-11-24 Last update: 2025-11-26 09:30
lintian reports 3 warnings normal
Lintian reports 3 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2024-03-01 Last update: 2024-03-01 12:04
10 low-priority security issues in trixie low

There are 10 open security issues in trixie.

9 issues left for the package maintainer to handle:
  • CVE-2025-65493: (needs triaging) NULL pointer dereference in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS/TLS connection that triggers BIO_get_data() to return NULL.
  • CVE-2025-65494: (needs triaging) NULL pointer dereference in get_san_or_cn_from_cert() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted X.509 certificate that causes sk_GENERAL_NAME_value() to return NULL.
  • CVE-2025-65495: (needs triaging) Integer signedness error in tls_verify_call_back() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted TLS certificate that causes i2d_X509() to return -1 and be misused as a malloc() size parameter.
  • CVE-2025-65496: (needs triaging) NULL pointer dereference in coap_dtls_generate_cookie() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS handshake that triggers SSL_get_SSL_CTX() to return NULL.
  • CVE-2025-65497: (needs triaging) NULL pointer dereference in coap_dtls_generate_cookie() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS handshake that triggers SSL_get_SSL_CTX() to return NULL.
  • CVE-2025-65498: (needs triaging) NULL pointer dereference in coap_dtls_generate_cookie() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS handshake that triggers SSL_get_SSL_CTX() to return NULL.
  • CVE-2025-65499: (needs triaging) Array index error in tls_verify_call_back() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS handshake that triggers SSL_get_ex_data_X509_STORE_CTX_idx() to return -1.
  • CVE-2025-65500: (needs triaging) NULL pointer dereference in coap_dtls_generate_cookie() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS handshake that triggers SSL_get_SSL_CTX() to return NULL.
  • CVE-2025-65501: (needs triaging) Null pointer dereference in coap_dtls_info_callback() in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a DTLS handshake where SSL_get_app_data() returns NULL.

You can find information about how to handle these issues in the security team's documentation.

1 ignored issue:
  • CVE-2024-46304: A NULL pointer dereference in libcoap v4.3.5-rc2 and below allows a remote attacker to cause a denial of service via the coap_handle_request_put_block function in src/coap_block.c.
Created: 2024-01-28 Last update: 2025-11-26 09:30
12 low-priority security issues in bookworm low

There are 12 open security issues in bookworm.

9 issues left for the package maintainer to handle:
  • CVE-2025-65493: (needs triaging) NULL pointer dereference in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS/TLS connection that triggers BIO_get_data() to return NULL.
  • CVE-2025-65494: (needs triaging) NULL pointer dereference in get_san_or_cn_from_cert() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted X.509 certificate that causes sk_GENERAL_NAME_value() to return NULL.
  • CVE-2025-65495: (needs triaging) Integer signedness error in tls_verify_call_back() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted TLS certificate that causes i2d_X509() to return -1 and be misused as a malloc() size parameter.
  • CVE-2025-65496: (needs triaging) NULL pointer dereference in coap_dtls_generate_cookie() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS handshake that triggers SSL_get_SSL_CTX() to return NULL.
  • CVE-2025-65497: (needs triaging) NULL pointer dereference in coap_dtls_generate_cookie() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS handshake that triggers SSL_get_SSL_CTX() to return NULL.
  • CVE-2025-65498: (needs triaging) NULL pointer dereference in coap_dtls_generate_cookie() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS handshake that triggers SSL_get_SSL_CTX() to return NULL.
  • CVE-2025-65499: (needs triaging) Array index error in tls_verify_call_back() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS handshake that triggers SSL_get_ex_data_X509_STORE_CTX_idx() to return -1.
  • CVE-2025-65500: (needs triaging) NULL pointer dereference in coap_dtls_generate_cookie() in src/coap_openssl.c in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a crafted DTLS handshake that triggers SSL_get_SSL_CTX() to return NULL.
  • CVE-2025-65501: (needs triaging) Null pointer dereference in coap_dtls_info_callback() in OISM libcoap 4.3.5 allows remote attackers to cause a denial of service via a DTLS handshake where SSL_get_app_data() returns NULL.

You can find information about how to handle these issues in the security team's documentation.

3 ignored issues:
  • CVE-2023-30362: Buffer Overflow vulnerability in coap_send function in libcoap library 4.3.1-103-g52cfd56 fixed in 4.3.1-120-ge242200 allows attackers to obtain sensitive information via malformed pdu.
  • CVE-2024-31031: An issue in `coap_pdu.c` in libcoap 4.3.4 allows attackers to cause undefined behavior via a sequence of messages leading to unsigned integer overflow.
  • CVE-2024-46304: A NULL pointer dereference in libcoap v4.3.5-rc2 and below allows a remote attacker to cause a denial of service via the coap_handle_request_put_block function in src/coap_block.c.
Created: 2023-07-07 Last update: 2025-11-26 09:30
news
[rss feed]
  • [2025-08-31] libcoap3 4.3.5-1 MIGRATED to testing (Debian testing watch)
  • [2025-08-30] Accepted libcoap3 4.3.4-1.1+deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Thorsten Alteholz)
  • [2025-08-26] Accepted libcoap3 4.3.5-1 (source) into unstable (Thorsten Alteholz)
  • [2024-05-03] libcoap3 4.3.4-1.1 MIGRATED to testing (Debian testing watch)
  • [2024-03-17] libcoap3 REMOVED from testing (Debian testing watch)
  • [2024-02-29] Accepted libcoap3 4.3.4-1.1 (source) into unstable (Benjamin Drung)
  • [2024-01-31] Accepted libcoap3 4.3.4-1.1~exp1 (source) into experimental (Steve Langasek)
  • [2023-11-03] libcoap3 4.3.4-1 MIGRATED to testing (Debian testing watch)
  • [2023-10-29] Accepted libcoap3 4.3.4-1 (source) into unstable (Carsten Schoenert)
  • [2023-09-22] libcoap3 4.3.3-1 MIGRATED to testing (Debian testing watch)
  • [2023-09-16] Accepted libcoap3 4.3.3-1 (source) into unstable (Carsten Schoenert)
  • [2023-07-13] libcoap3 4.3.1-2 MIGRATED to testing (Debian testing watch)
  • [2023-07-08] Accepted libcoap3 4.3.1-2 (source) into unstable (Carsten Schoenert)
  • [2022-12-03] libcoap3 4.3.1-1 MIGRATED to testing (Debian testing watch)
  • [2022-11-28] Accepted libcoap3 4.3.1-1 (source) into unstable (Carsten Schoenert)
  • [2021-10-22] libcoap3 4.3.0-2 MIGRATED to testing (Debian testing watch)
  • [2021-10-17] Accepted libcoap3 4.3.0-2 (source) into unstable (Carsten Schoenert)
  • [2021-09-23] libcoap3 4.3.0-1 MIGRATED to testing (Debian testing watch)
  • [2021-09-17] Accepted libcoap3 4.3.0-1 (source) into unstable (Carsten Schoenert)
  • [2021-08-16] Accepted libcoap3 4.3.0-1~exp1 (source amd64 all) into experimental, experimental (Debian FTP Masters) (signed by: Carsten Schoenert)
  • [2021-08-16] Accepted libcoap3 4.3.0~rc2-1 (source amd64 all) into experimental, experimental (Debian FTP Masters) (signed by: Carsten Schoenert)
bugs [bug history graph]
  • all: 2
  • RC: 0
  • I&N: 1
  • M&W: 1
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 3)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 4.3.5-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing