Source: openbabel
Version: 3.1.1+dfsg-12
Severity: important
Tags: security upstream
Forwarded: https://github.com/openbabel/openbabel/issues/2848
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerabilities were published for openbabel.

CVE-2026-2704[0]:
| A security vulnerability has been detected in Open Babel up to
| 3.1.1. The affected element is the function
| OpenBabel::transform3d::DescribeAsString of the file
| src/math/transform3d.cpp of the component CIF File Handler. The
| manipulation leads to out-of-bounds read. It is possible to initiate
| the attack remotely. The exploit has been disclosed publicly and may
| be used. The identifier of the patch is
| e23a224b8fd9d7c2a7cde9ef4ec6afb4c05aa08a. It is suggested to install
| a patch to address this issue. The project was informed of the
| problem early through an issue report but has not responded yet.


CVE-2026-2705[1]:
| A vulnerability was detected in Open Babel up to 3.1.1. The impacted
| element is the function OBAtom::SetFormalCharge in the library
| include/openbabel/atom.h of the component MOL2 File Handler. The
| manipulation results in out-of-bounds read. It is possible to launch
| the attack remotely. The exploit is now public and may be used. The
| patch is identified as e23a224b8fd9d7c2a7cde9ef4ec6afb4c05aa08a. A
| patch should be applied to remediate this issue. The project was
| informed of the problem early through an issue report but has not
| responded yet.


CVE-2026-3408[2]:
| A vulnerability was identified in Open Babel up to 3.1.1. This
| impacts the function OBAtom::GetExplicitValence of the file
| isrc/atom.cpp of the component CDXML File Handler. Such manipulation
| leads to null pointer dereference. The attack can be launched
| remotely. The exploit is publicly available and might be used. The
| name of the patch is e23a224b8fd9d7c2a7cde9ef4ec6afb4c05aa08a. It is
| best practice to apply a patch to resolve this issue.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-2704
    https://www.cve.org/CVERecord?id=CVE-2026-2704
[1] https://security-tracker.debian.org/tracker/CVE-2026-2705
    https://www.cve.org/CVERecord?id=CVE-2026-2705
[2] https://security-tracker.debian.org/tracker/CVE-2026-3408
    https://www.cve.org/CVERecord?id=CVE-2026-3408
[3] https://github.com/openbabel/openbabel/issues/2848

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to