Source: openbabel Version: 3.1.1+dfsg-12 Severity: important Tags: security upstream X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]> Control: found -1 3.1.1+dfsg-9
Hi, The following vulnerabilities were published for openbabel. CVE-2025-10994[0]: | A weakness has been identified in Open Babel up to 3.1.1. This | affects the function GAMESSOutputFormat::ReadMolecule of the file | gamessformat.cpp. This manipulation causes use after free. It is | possible to launch the attack on the local host. The exploit has | been made available to the public and could be exploited. CVE-2025-10995[1]: | A security vulnerability has been detected in Open Babel up to | 3.1.1. This vulnerability affects the function | zlib_stream::basic_unzip_streambuf::underflow in the library | /src/zipstreamimpl.h. Such manipulation leads to memory corruption. | Local access is required to approach this attack. The exploit has | been disclosed publicly and may be used. CVE-2025-10996[2]: | A vulnerability was detected in Open Babel up to 3.1.1. This issue | affects the function OBSmilesParser::ParseSmiles of the file | /src/formats/smilesformat.cpp. Performing manipulation results in | heap-based buffer overflow. The attack needs to be approached | locally. The exploit is now public and may be used. CVE-2025-10997[3]: | A flaw has been found in Open Babel up to 3.1.1. Impacted is the | function ChemKinFormat::CheckSpecies of the file | /src/formats/chemkinformat.cpp. Executing manipulation can lead to | heap-based buffer overflow. The attack can only be executed locally. | The exploit has been published and may be used. CVE-2025-10998[4]: | A vulnerability has been found in Open Babel up to 3.1.1. The | affected element is the function | ChemKinFormat::ReadReactionQualifierLines of the file | /src/formats/chemkinformat.cpp. The manipulation leads to null | pointer dereference. The attack can only be performed from a local | environment. The exploit has been disclosed to the public and may be | used. CVE-2025-10999[5]: | A vulnerability was found in Open Babel up to 3.1.1. The impacted | element is the function CacaoFormat::SetHilderbrandt of the file | /src/formats/cacaoformat.cpp. The manipulation results in null | pointer dereference. The attack is only possible with local access. | The exploit has been made public and could be used. CVE-2025-11000[6]: | A vulnerability was determined in Open Babel up to 3.1.1. This | affects the function PQSFormat::ReadMolecule of the file | /src/formats/PQSformat.cpp. This manipulation causes null pointer | dereference. The attack is restricted to local execution. The | exploit has been publicly disclosed and may be utilized. If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2025-10994 https://www.cve.org/CVERecord?id=CVE-2025-10994 [1] https://security-tracker.debian.org/tracker/CVE-2025-10995 https://www.cve.org/CVERecord?id=CVE-2025-10995 [2] https://security-tracker.debian.org/tracker/CVE-2025-10996 https://www.cve.org/CVERecord?id=CVE-2025-10996 [3] https://security-tracker.debian.org/tracker/CVE-2025-10997 https://www.cve.org/CVERecord?id=CVE-2025-10997 [4] https://security-tracker.debian.org/tracker/CVE-2025-10998 https://www.cve.org/CVERecord?id=CVE-2025-10998 [5] https://security-tracker.debian.org/tracker/CVE-2025-10999 https://www.cve.org/CVERecord?id=CVE-2025-10999 [6] https://security-tracker.debian.org/tracker/CVE-2025-11000 https://www.cve.org/CVERecord?id=CVE-2025-11000 Regards, Salvatore

