CVE-2026-2705

NameCVE-2026-2705
DescriptionA vulnerability was detected in Open Babel up to 3.1.1. The impacted element is the function OBAtom::SetFormalCharge in the library include/openbabel/atom.h of the component MOL2 File Handler. The manipulation results in out-of-bounds read. It is possible to launch the attack remotely. The exploit is now public and may be used. The patch is identified as e23a224b8fd9d7c2a7cde9ef4ec6afb4c05aa08a. A patch should be applied to remediate this issue. The project was informed of the problem early through an issue report but has not responded yet.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1129566

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openbabel (PTS)bullseye3.1.1+dfsg-6vulnerable
bookworm3.1.1+dfsg-9vulnerable
trixie3.1.1+dfsg-12vulnerable
forky, sid3.1.1+dfsg-14vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
openbabelsource(unstable)(unfixed)1129566

Notes

[trixie] - openbabel <no-dsa> (Minor issue)
[bookworm] - openbabel <no-dsa> (Minor issue)
[bullseye] - openbabel <postponed> (Minor issue)
https://github.com/openbabel/openbabel/issues/2848
https://github.com/openbabel/openbabel/pull/2862

Search for package or bug name: Reporting problems