<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for autogen is now available for openEuler-24.03-LTS</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2026-1317</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2026-02-06</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2026-02-06</InitialReleaseDate>
		<CurrentReleaseDate>2026-02-06</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2026-02-06</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">autogen security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for autogen is now available for openEuler-24.03-LTS</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">AutoGen is a tool designed to simplify the creation and maintenance of programs that contain large amounts of repetitious text. It is especially valuable in programs that have several blocks of text that must be kept synchronised.

Security Fix(es):

A vulnerability, which was classified as problematic, was found in GNU libopts up to 27.6. Affected is the function __strstr_sse2. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. This issue was initially reported to the tcpreplay project, but the code maintainer explains, that this &quot;bug appears to be in libopts which is an external library.&quot; This vulnerability only affects products that are no longer supported by the maintainer.(CVE-2025-8746)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for autogen is now available for openEuler-24.03-LTS.

openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Medium</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">autogen</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1317</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-8746</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-8746</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-24.03-LTS" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openEuler-24.03-LTS</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="autogen-5.18.16-6" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">autogen-5.18.16-6.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="autogen-debuginfo-5.18.16-6" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">autogen-debuginfo-5.18.16-6.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="autogen-debugsource-5.18.16-6" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">autogen-debugsource-5.18.16-6.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="autogen-devel-5.18.16-6" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">autogen-devel-5.18.16-6.oe2403.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="autogen-5.18.16-6" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">autogen-5.18.16-6.oe2403.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="autogen-5.18.16-6" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">autogen-5.18.16-6.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="autogen-debuginfo-5.18.16-6" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">autogen-debuginfo-5.18.16-6.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="autogen-debugsource-5.18.16-6" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">autogen-debugsource-5.18.16-6.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="autogen-devel-5.18.16-6" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">autogen-devel-5.18.16-6.oe2403.x86_64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="autogen-help-5.18.16-6" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">autogen-help-5.18.16-6.oe2403.noarch.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability, which was classified as problematic, was found in GNU libopts up to 27.6. Affected is the function __strstr_sse2. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. This issue was initially reported to the tcpreplay project, but the code maintainer explains, that this &quot;bug appears to be in libopts which is an external library.&quot; This vulnerability only affects products that are no longer supported by the maintainer.</Note>
		</Notes>
		<ReleaseDate>2026-02-06</ReleaseDate>
		<CVE>CVE-2025-8746</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>5.5</BaseScore>
				<Vector>AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>autogen security update</Description>
				<DATE>2026-02-06</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1317</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>