Source: openbabel Version: 3.1.1+dfsg-12 Severity: important Tags: security upstream Forwarded: https://github.com/openbabel/openbabel/issues/2848 X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerabilities were published for openbabel. CVE-2026-2704[0]: | A security vulnerability has been detected in Open Babel up to | 3.1.1. The affected element is the function | OpenBabel::transform3d::DescribeAsString of the file | src/math/transform3d.cpp of the component CIF File Handler. The | manipulation leads to out-of-bounds read. It is possible to initiate | the attack remotely. The exploit has been disclosed publicly and may | be used. The identifier of the patch is | e23a224b8fd9d7c2a7cde9ef4ec6afb4c05aa08a. It is suggested to install | a patch to address this issue. The project was informed of the | problem early through an issue report but has not responded yet. CVE-2026-2705[1]: | A vulnerability was detected in Open Babel up to 3.1.1. The impacted | element is the function OBAtom::SetFormalCharge in the library | include/openbabel/atom.h of the component MOL2 File Handler. The | manipulation results in out-of-bounds read. It is possible to launch | the attack remotely. The exploit is now public and may be used. The | patch is identified as e23a224b8fd9d7c2a7cde9ef4ec6afb4c05aa08a. A | patch should be applied to remediate this issue. The project was | informed of the problem early through an issue report but has not | responded yet. CVE-2026-3408[2]: | A vulnerability was identified in Open Babel up to 3.1.1. This | impacts the function OBAtom::GetExplicitValence of the file | isrc/atom.cpp of the component CDXML File Handler. Such manipulation | leads to null pointer dereference. The attack can be launched | remotely. The exploit is publicly available and might be used. The | name of the patch is e23a224b8fd9d7c2a7cde9ef4ec6afb4c05aa08a. It is | best practice to apply a patch to resolve this issue. If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2026-2704 https://www.cve.org/CVERecord?id=CVE-2026-2704 [1] https://security-tracker.debian.org/tracker/CVE-2026-2705 https://www.cve.org/CVERecord?id=CVE-2026-2705 [2] https://security-tracker.debian.org/tracker/CVE-2026-3408 https://www.cve.org/CVERecord?id=CVE-2026-3408 [3] https://github.com/openbabel/openbabel/issues/2848 Please adjust the affected versions in the BTS as needed. Regards, Salvatore

