Debian Package Tracker
Register | Log in
Subscribe

openbabel

Chemical toolbox utilities (cli)

Choose email to subscribe with

general
  • source: openbabel (main)
  • version: 3.1.1+dfsg-12
  • maintainer: Debichem Team (archive) (DMD)
  • uploaders: Michael Banck [DMD] – Andrius Merkys [DMD] – Daniel Leidert [DMD]
  • arch: all any
  • std-ver: 4.6.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 2.4.1+dfsg-3
  • oldstable: 3.1.1+dfsg-6
  • stable: 3.1.1+dfsg-9
  • testing: 3.1.1+dfsg-12
  • unstable: 3.1.1+dfsg-12
versioned links
  • 2.4.1+dfsg-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.1.1+dfsg-6: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.1.1+dfsg-9: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.1.1+dfsg-12: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libchemistry-openbabel-perl
  • libopenbabel-dev (1 bugs: 0, 0, 1, 0)
  • libopenbabel-doc
  • libopenbabel7
  • openbabel (2 bugs: 0, 2, 0, 0)
  • openbabel-gui (1 bugs: 0, 0, 1, 0)
  • python3-openbabel
action needed
14 security issues in sid high

There are 14 open security issues in sid.

14 important issues:
  • CVE-2022-37331: An out-of-bounds write vulnerability exists in the Gaussian format orientation functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2022-41793: An out-of-bounds write vulnerability exists in the CSR format title functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2022-42885: A use of uninitialized pointer vulnerability exists in the GRO format res functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2022-43467: An out-of-bounds write vulnerability exists in the PQS format coord_file functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2022-43607: An out-of-bounds write vulnerability exists in the MOL2 format attribute and value functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2022-44451: A use of uninitialized pointer vulnerability exists in the MSI format atom functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2022-46280: A use of uninitialized pointer vulnerability exists in the PQS format pFormat functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2022-46289: Multiple out-of-bounds write vulnerabilities exist in the ORCA format nAtoms functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.nAtoms calculation wrap-around, leading to a small buffer allocation
  • CVE-2022-46290: Multiple out-of-bounds write vulnerabilities exist in the ORCA format nAtoms functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.The loop that stores the coordinates does not check its index against nAtoms
  • CVE-2022-46291: Multiple out-of-bounds write vulnerabilities exist in the translationVectors parsing functionality in multiple supported formats of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability affects the MSI file format
  • CVE-2022-46292: Multiple out-of-bounds write vulnerabilities exist in the translationVectors parsing functionality in multiple supported formats of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability affects the MOPAC file format, inside the Unit Cell Translation section
  • CVE-2022-46293: Multiple out-of-bounds write vulnerabilities exist in the translationVectors parsing functionality in multiple supported formats of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability affects the MOPAC file format, inside the Final Point and Derivatives section
  • CVE-2022-46294: Multiple out-of-bounds write vulnerabilities exist in the translationVectors parsing functionality in multiple supported formats of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability affects the MOPAC Cartesian file format
  • CVE-2022-46295: Multiple out-of-bounds write vulnerabilities exist in the translationVectors parsing functionality in multiple supported formats of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability affects the Gaussian file format
Created: 2023-07-23 Last update: 2025-04-20 20:02
lintian reports 2 errors and 6 warnings high
Lintian reports 2 errors and 6 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2025-04-10 Last update: 2025-04-10 00:31
Fails to build during reproducibility testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2025-05-23 Last update: 2025-06-05 19:01
Multiarch hinter reports 1 issue(s) low
There are issues with the multiarch metadata for this package.
  • libopenbabel-doc could be marked Multi-Arch: foreign
Created: 2016-09-14 Last update: 2025-06-05 19:01
14 low-priority security issues in bookworm low

There are 14 open security issues in bookworm.

14 issues left for the package maintainer to handle:
  • CVE-2022-37331: (postponed; to be fixed through a stable update) An out-of-bounds write vulnerability exists in the Gaussian format orientation functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2022-41793: (postponed; to be fixed through a stable update) An out-of-bounds write vulnerability exists in the CSR format title functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2022-42885: (postponed; to be fixed through a stable update) A use of uninitialized pointer vulnerability exists in the GRO format res functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2022-43467: (postponed; to be fixed through a stable update) An out-of-bounds write vulnerability exists in the PQS format coord_file functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2022-43607: (postponed; to be fixed through a stable update) An out-of-bounds write vulnerability exists in the MOL2 format attribute and value functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2022-44451: (postponed; to be fixed through a stable update) A use of uninitialized pointer vulnerability exists in the MSI format atom functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2022-46280: (postponed; to be fixed through a stable update) A use of uninitialized pointer vulnerability exists in the PQS format pFormat functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
  • CVE-2022-46289: (postponed; to be fixed through a stable update) Multiple out-of-bounds write vulnerabilities exist in the ORCA format nAtoms functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.nAtoms calculation wrap-around, leading to a small buffer allocation
  • CVE-2022-46290: (postponed; to be fixed through a stable update) Multiple out-of-bounds write vulnerabilities exist in the ORCA format nAtoms functionality of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.The loop that stores the coordinates does not check its index against nAtoms
  • CVE-2022-46291: (postponed; to be fixed through a stable update) Multiple out-of-bounds write vulnerabilities exist in the translationVectors parsing functionality in multiple supported formats of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability affects the MSI file format
  • CVE-2022-46292: (postponed; to be fixed through a stable update) Multiple out-of-bounds write vulnerabilities exist in the translationVectors parsing functionality in multiple supported formats of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability affects the MOPAC file format, inside the Unit Cell Translation section
  • CVE-2022-46293: (postponed; to be fixed through a stable update) Multiple out-of-bounds write vulnerabilities exist in the translationVectors parsing functionality in multiple supported formats of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability affects the MOPAC file format, inside the Final Point and Derivatives section
  • CVE-2022-46294: (postponed; to be fixed through a stable update) Multiple out-of-bounds write vulnerabilities exist in the translationVectors parsing functionality in multiple supported formats of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability affects the MOPAC Cartesian file format
  • CVE-2022-46295: (postponed; to be fixed through a stable update) Multiple out-of-bounds write vulnerabilities exist in the translationVectors parsing functionality in multiple supported formats of Open Babel 3.1.1 and master commit 530dbfa3. A specially-crafted malformed file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability affects the Gaussian file format

You can find information about how to handle these issues in the security team's documentation.

Created: 2023-07-23 Last update: 2025-04-20 20:02
debian/patches: 7 patches to forward upstream low

Among the 7 debian patches available in version 3.1.1+dfsg-12 of the package, we noticed the following issues:

  • 7 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2025-03-25 21:05
Build log checks report 3 warnings low
Build log checks report 3 warnings
Created: 2024-10-15 Last update: 2024-10-17 16:30
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.2 instead of 4.6.1).
Created: 2022-12-17 Last update: 2025-03-25 19:00
testing migrations
  • This package will soon be part of the auto-libxml2 transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
news
[rss feed]
  • [2025-03-30] openbabel 3.1.1+dfsg-12 MIGRATED to testing (Debian testing watch)
  • [2025-03-25] Accepted openbabel 3.1.1+dfsg-12 (source) into unstable (Andrius Merkys)
  • [2024-09-09] openbabel 3.1.1+dfsg-11 MIGRATED to testing (Debian testing watch)
  • [2024-09-04] Accepted openbabel 3.1.1+dfsg-11 (source) into unstable (Andrius Merkys)
  • [2024-07-08] openbabel 3.1.1+dfsg-10 MIGRATED to testing (Debian testing watch)
  • [2024-07-01] Accepted openbabel 3.1.1+dfsg-10 (source) into unstable (Andrius Merkys)
  • [2022-12-06] openbabel 3.1.1+dfsg-9 MIGRATED to testing (Debian testing watch)
  • [2022-12-02] openbabel 3.1.1+dfsg-8 MIGRATED to testing (Debian testing watch)
  • [2022-12-01] Accepted openbabel 3.1.1+dfsg-9 (source) into unstable (Andrius Merkys)
  • [2022-11-29] Accepted openbabel 3.1.1+dfsg-8 (source) into unstable (Andrius Merkys)
  • [2022-11-27] openbabel 3.1.1+dfsg-7.2 MIGRATED to testing (Debian testing watch)
  • [2022-11-24] Accepted openbabel 3.1.1+dfsg-7.2 (source) into unstable (Paul Gevers)
  • [2022-11-21] Accepted openbabel 3.1.1+dfsg-7.1 (source) into unstable (Paul Gevers)
  • [2022-09-13] openbabel 3.1.1+dfsg-7 MIGRATED to testing (Debian testing watch)
  • [2022-09-08] Accepted openbabel 3.1.1+dfsg-7 (source) into unstable (Andrius Merkys)
  • [2021-06-15] openbabel 3.1.1+dfsg-6 MIGRATED to testing (Debian testing watch)
  • [2021-06-10] Accepted openbabel 3.1.1+dfsg-6 (source) into unstable (Andrius Merkys)
  • [2021-03-06] openbabel 3.1.1+dfsg-5 MIGRATED to testing (Debian testing watch)
  • [2021-02-24] Accepted openbabel 3.1.1+dfsg-5 (source) into unstable (Andrius Merkys)
  • [2021-01-11] openbabel 3.1.1+dfsg-4 MIGRATED to testing (Debian testing watch)
  • [2021-01-06] Accepted openbabel 3.1.1+dfsg-4 (source) into unstable (Andrius Merkys)
  • [2020-06-14] openbabel 3.1.1+dfsg-3 MIGRATED to testing (Debian testing watch)
  • [2020-06-09] Accepted openbabel 3.1.1+dfsg-3 (source) into unstable (Andrius Merkys)
  • [2020-06-05] openbabel 3.1.1+dfsg-2 MIGRATED to testing (Debian testing watch)
  • [2020-05-31] Accepted openbabel 3.1.1+dfsg-2 (source) into unstable (Andrius Merkys)
  • [2020-05-29] Accepted openbabel 3.1.1+dfsg-1 (source amd64 all) into experimental, experimental (Debian FTP Masters) (signed by: Andrius Merkys)
  • [2020-04-12] openbabel 3.0.0+dfsg-4 MIGRATED to testing (Debian testing watch)
  • [2020-04-06] Accepted openbabel 3.0.0+dfsg-4 (source) into unstable (Andrius Merkys)
  • [2020-02-02] openbabel 3.0.0+dfsg-3 MIGRATED to testing (Debian testing watch)
  • [2020-01-28] Accepted openbabel 3.0.0+dfsg-3 (source) into unstable (Andrius Merkys)
  • 1
  • 2
bugs [bug history graph]
  • all: 9
  • RC: 0
  • I&N: 6
  • M&W: 3
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (2, 6)
  • buildd: logs, checks, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 3.1.1+dfsg-11ubuntu4
  • 6 bugs
  • patches for 3.1.1+dfsg-11ubuntu4

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing