CVE-2026-3408

NameCVE-2026-3408
DescriptionA vulnerability was identified in Open Babel up to 3.1.1. This impacts the function OBAtom::GetExplicitValence of the file isrc/atom.cpp of the component CDXML File Handler. Such manipulation leads to null pointer dereference. The attack can be launched remotely. The exploit is publicly available and might be used. The name of the patch is e23a224b8fd9d7c2a7cde9ef4ec6afb4c05aa08a. It is best practice to apply a patch to resolve this issue.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1129566

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openbabel (PTS)bullseye3.1.1+dfsg-6vulnerable
bookworm3.1.1+dfsg-9vulnerable
trixie3.1.1+dfsg-12vulnerable
forky, sid3.1.1+dfsg-14vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
openbabelsource(unstable)(unfixed)1129566

Notes

[trixie] - openbabel <no-dsa> (Minor issue)
[bookworm] - openbabel <no-dsa> (Minor issue)
[bullseye] - openbabel <postponed> (Minor issue; can be fixed in next update)
https://github.com/openbabel/openbabel/issues/2848
https://github.com/openbabel/openbabel/pull/2862

Search for package or bug name: Reporting problems