CVE-2026-2704

NameCVE-2026-2704
DescriptionA security vulnerability has been detected in Open Babel up to 3.1.1. The affected element is the function OpenBabel::transform3d::DescribeAsString of the file src/math/transform3d.cpp of the component CIF File Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The identifier of the patch is e23a224b8fd9d7c2a7cde9ef4ec6afb4c05aa08a. It is suggested to install a patch to address this issue. The project was informed of the problem early through an issue report but has not responded yet.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1129566

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openbabel (PTS)bullseye3.1.1+dfsg-6vulnerable
bookworm3.1.1+dfsg-9vulnerable
trixie3.1.1+dfsg-12vulnerable
forky, sid3.1.1+dfsg-14vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
openbabelsource(unstable)(unfixed)1129566

Notes

[trixie] - openbabel <no-dsa> (Minor issue)
[bookworm] - openbabel <no-dsa> (Minor issue)
[bullseye] - openbabel <postponed> (Minor issue)
https://github.com/openbabel/openbabel/issues/2848
https://github.com/openbabel/openbabel/pull/2862

Search for package or bug name: Reporting problems