This is an automated email from the ASF dual-hosted git repository.

ardovm pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/openoffice-org.git


The following commit(s) were added to refs/heads/main by this push:
     new e1cfc11cae Security bulletin for the Apache OpenOffice 4.1.16 release
e1cfc11cae is described below

commit e1cfc11cae923ce9c79fb4ce0b24ceb0340ce4e1
Author: Arrigo Marchiori <[email protected]>
AuthorDate: Tue Nov 11 22:41:53 2025 +0100

    Security bulletin for the Apache OpenOffice 4.1.16 release
---
 content/security/bulletin.html          | 12 +++++++++
 content/security/cves/CVE-2025-64401.md | 45 ++++++++++++++++++++++++++++++++
 content/security/cves/CVE-2025-64402.md | 43 ++++++++++++++++++++++++++++++
 content/security/cves/CVE-2025-64403.md | 43 ++++++++++++++++++++++++++++++
 content/security/cves/CVE-2025-64404.md | 43 ++++++++++++++++++++++++++++++
 content/security/cves/CVE-2025-64405.md | 43 ++++++++++++++++++++++++++++++
 content/security/cves/CVE-2025-64406.md | 42 ++++++++++++++++++++++++++++++
 content/security/cves/CVE-2025-64407.md | 46 +++++++++++++++++++++++++++++++++
 8 files changed, 317 insertions(+)

diff --git a/content/security/bulletin.html b/content/security/bulletin.html
index 5a0d27a403..3871338c18 100644
--- a/content/security/bulletin.html
+++ b/content/security/bulletin.html
@@ -19,6 +19,18 @@
     subscribe to our <a href="alerts.html">security-alerts mailing 
list</a>.</strong>
   </p>
 
+  <h3>Fixed in Apache OpenOffice 4.1.16</h3>
+
+  <ul>
+    <li><a href="cves/CVE-2025-64401.html">CVE-2025-64401</a>: Remote 
documents loaded without prompt via IFrame.</li>
+    <li><a href="cves/CVE-2025-64402.html">CVE-2025-64402</a>: Remote 
documents loaded without prompt via OLE objects.</li>
+    <li><a href="cves/CVE-2025-64403.html">CVE-2025-64403</a>: Remote 
documents loaded without prompt via "external data sources" in Calc.</li>
+    <li><a href="cves/CVE-2025-64404.html">CVE-2025-64404</a>: Remote 
documents loaded without prompt via background and bullet images.</li>
+    <li><a href="cves/CVE-2025-64405.html">CVE-2025-64405</a>: Remote 
documents loaded without prompt via DDE function.</li>
+    <li><a href="cves/CVE-2025-64406.html">CVE-2025-64406</a>: Possible memory 
corruption during CSV import.</li>
+    <li><a href="cves/CVE-2025-64407.html">CVE-2025-64407</a>: URL fetching 
can be used to exfiltrate arbitrary INI file values and environment 
variables.</li>
+  </ul>
+
   <h3>Fixed in Apache OpenOffice 4.1.15</h3>
 
   <ul>
diff --git a/content/security/cves/CVE-2025-64401.md 
b/content/security/cves/CVE-2025-64401.md
new file mode 100644
index 0000000000..27f2930524
--- /dev/null
+++ b/content/security/cves/CVE-2025-64401.md
@@ -0,0 +1,45 @@
+type=cve
+cve=CVE-2025-64401
+cvedesc=Remote documents loaded without prompt via IFrame
+cvefixed=4.1.16
+tags=weekly links, java
+status=published
+~~~~~~
+
+**Description**
+
+Apache OpenOffice documents can contain links. A missing Authorization 
vulnerability in Apache OpenOffice allowed an attacker to craft a document that 
would cause external links to be loaded without prompt. In the affected 
versions of Apache OpenOffice, documents that used "floating frames" linked to 
external files would load the contents of those frames without prompting the 
user for permission to do so.
+
+This issue affects Apache OpenOffice: through 4.1.15.
+
+Users are recommended to upgrade to version 4.1.16, which fixes the issue.
+
+The LibreOffice suite reported this issue as CVE-2023-2255
+
+**Severity: Moderate**
+
+There are no known exploits of this vulnerability.  
+A proof-of-concept demonstration exists.
+
+Thanks to the reporter for discovering this issue.
+
+**Vendor: The Apache Software Foundation**
+
+**Versions Affected**
+
+All Apache OpenOffice versions 4.1.15 and older are affected.  
+OpenOffice.org versions may also be affected.
+
+**Mitigation**
+
+Install Apache OpenOffice 4.1.16 for the latest maintenance and cumulative 
security fixes. Use the Apache OpenOffice [download 
page](https://www.openoffice.org/download/).
+
+**Acknowledgements**
+
+The Apache OpenOffice Security Team would like to thank Amel Bouziane-Leblond 
for discovering and reporting this issue.
+
+**Further Information**
+
+For additional information and assistance, consult the [Apache OpenOffice 
Community Forums](https://forum.openoffice.org/) or make requests to the 
[email protected] public mailing list.
+
+The latest information on Apache OpenOffice security bulletins can be found at 
the [Bulletin Archive](https://www.openoffice.org/security/bulletin.html) page.
diff --git a/content/security/cves/CVE-2025-64402.md 
b/content/security/cves/CVE-2025-64402.md
new file mode 100644
index 0000000000..0eb7b92cc8
--- /dev/null
+++ b/content/security/cves/CVE-2025-64402.md
@@ -0,0 +1,43 @@
+type=cve
+cve=CVE-2025-64402
+cvedesc=Remote documents loaded without prompt via OLE objects
+cvefixed=4.1.16
+tags=weekly links, java
+status=published
+~~~~~~
+
+**Description**
+
+Apache OpenOffice documents can contain links. A missing Authorization 
vulnerability in Apache OpenOffice allowed an attacker to craft a document that 
would cause external links to be loaded without prompt. In the affected 
versions of Apache OpenOffice, documents that used "OLE objects" linked to 
external files would load the contents of those files without prompting the 
user for permission to do so.
+
+This issue affects Apache OpenOffice: through 4.1.15.
+
+Users are recommended to upgrade to version 4.1.16, which fixes the issue.
+
+**Severity: Moderate**
+
+There are no known exploits of this vulnerability.  
+A proof-of-concept demonstration exists.
+
+Thanks to the reporter for discovering this issue.
+
+**Vendor: The Apache Software Foundation**
+
+**Versions Affected**
+
+All Apache OpenOffice versions 4.1.15 and older are affected.  
+OpenOffice.org versions may also be affected.
+
+**Mitigation**
+
+Install Apache OpenOffice 4.1.16 for the latest maintenance and cumulative 
security fixes. Use the Apache OpenOffice [download 
page](https://www.openoffice.org/download/).
+
+**Acknowledgements**
+
+The Apache OpenOffice Security Team would like to thank Dawid Golunski, 
Doyensec LLC for discovering and reporting this issue.
+
+**Further Information**
+
+For additional information and assistance, consult the [Apache OpenOffice 
Community Forums](https://forum.openoffice.org/) or make requests to the 
[email protected] public mailing list.
+
+The latest information on Apache OpenOffice security bulletins can be found at 
the [Bulletin Archive](https://www.openoffice.org/security/bulletin.html) page.
diff --git a/content/security/cves/CVE-2025-64403.md 
b/content/security/cves/CVE-2025-64403.md
new file mode 100644
index 0000000000..9ed8adeeca
--- /dev/null
+++ b/content/security/cves/CVE-2025-64403.md
@@ -0,0 +1,43 @@
+type=cve
+cve=CVE-2025-64403
+cvedesc=Remote documents loaded without prompt via "external data sources" in 
Calc
+cvefixed=4.1.16
+tags=weekly links, java
+status=published
+~~~~~~
+
+**Description**
+
+Apache OpenOffice Calc spreadsheet can contain links to other files, in the 
form of "external data sources". A missing Authorization vulnerability in 
Apache OpenOffice allowed an attacker to craft a document that would cause such 
links to be loaded without prompt.
+
+This issue affects Apache OpenOffice: through 4.1.15.
+
+Users are recommended to upgrade to version 4.1.16, which fixes the issue.
+
+**Severity: Moderate**
+
+There are no known exploits of this vulnerability.  
+A proof-of-concept demonstration exists.
+
+Thanks to the reporter for discovering this issue.
+
+**Vendor: The Apache Software Foundation**
+
+**Versions Affected**
+
+All Apache OpenOffice versions 4.1.15 and older are affected.  
+OpenOffice.org versions may also be affected.
+
+**Mitigation**
+
+Install Apache OpenOffice 4.1.16 for the latest maintenance and cumulative 
security fixes. Use the Apache OpenOffice [download 
page](https://www.openoffice.org/download/).
+
+**Acknowledgements**
+
+The Apache OpenOffice Security Team would like to thank Reginaldo Silva of 
ubercomp.com for discovering and reporting this issue.
+
+**Further Information**
+
+For additional information and assistance, consult the [Apache OpenOffice 
Community Forums](https://forum.openoffice.org/) or make requests to the 
[email protected] public mailing list.
+
+The latest information on Apache OpenOffice security bulletins can be found at 
the [Bulletin Archive](https://www.openoffice.org/security/bulletin.html) page.
diff --git a/content/security/cves/CVE-2025-64404.md 
b/content/security/cves/CVE-2025-64404.md
new file mode 100644
index 0000000000..40ae987ec2
--- /dev/null
+++ b/content/security/cves/CVE-2025-64404.md
@@ -0,0 +1,43 @@
+type=cve
+cve=CVE-2025-64404
+cvedesc=Remote documents loaded without prompt via background and bullet images
+cvefixed=4.1.16
+tags=weekly links, java
+status=published
+~~~~~~
+
+**Description**
+
+Apache OpenOffice documents can contain links to other files. A missing 
Authorization vulnerability in Apache OpenOffice allowed an attacker to craft a 
document that would cause external links to be loaded without prompt. In the 
affected versions of Apache OpenOffice, documents that used background fill 
images, or bullet images, linked to external files would load the contents of 
those files without prompting the user for permission to do so.
+
+This issue affects Apache OpenOffice: through 4.1.15.
+
+Users are recommended to upgrade to version 4.1.16, which fixes the issue.
+
+**Severity: Moderate**
+
+There are no known exploits of this vulnerability.  
+A proof-of-concept demonstration exists.
+
+Thanks to the reporter for discovering this issue.
+
+**Vendor: The Apache Software Foundation**
+
+**Versions Affected**
+
+All Apache OpenOffice versions 4.1.15 and older are affected.  
+OpenOffice.org versions may also be affected.
+
+**Mitigation**
+
+Install Apache OpenOffice 4.1.16 for the latest maintenance and cumulative 
security fixes. Use the Apache OpenOffice [download 
page](https://www.openoffice.org/download/).
+
+**Acknowledgements**
+
+The Apache OpenOffice Security Team would like to thank Reginaldo Silva of 
ubercomp.com for discovering and reporting this issue.
+
+**Further Information**
+
+For additional information and assistance, consult the [Apache OpenOffice 
Community Forums](https://forum.openoffice.org/) or make requests to the 
[email protected] public mailing list.
+
+The latest information on Apache OpenOffice security bulletins can be found at 
the [Bulletin Archive](https://www.openoffice.org/security/bulletin.html) page.
diff --git a/content/security/cves/CVE-2025-64405.md 
b/content/security/cves/CVE-2025-64405.md
new file mode 100644
index 0000000000..b05a53a6d8
--- /dev/null
+++ b/content/security/cves/CVE-2025-64405.md
@@ -0,0 +1,43 @@
+type=cve
+cve=CVE-2025-64405
+cvedesc=Remote documents loaded without prompt via DDE function
+cvefixed=4.1.16
+tags=weekly links, java
+status=published
+~~~~~~
+
+**Description**
+
+Apache OpenOffice documents can contain links. A missing Authorization 
vulnerability in Apache OpenOffice allowed an attacker to craft a document that 
would cause external links to be loaded without prompt. In the affected 
versions of Apache OpenOffice, Calc spreadsheet containing DDE links to 
external files would load the contents of those files without prompting the 
user for permission to do so.
+
+This issue affects Apache OpenOffice: through 4.1.15.
+
+Users are recommended to upgrade to version 4.1.16, which fixes the issue.
+
+**Severity: Moderate**
+
+There are no known exploits of this vulnerability.  
+A proof-of-concept demonstration exists.
+
+Thanks to the reporter for discovering this issue.
+
+**Vendor: The Apache Software Foundation**
+
+**Versions Affected**
+
+All Apache OpenOffice versions 4.1.15 and older are affected.  
+OpenOffice.org versions may also be affected.
+
+**Mitigation**
+
+Install Apache OpenOffice 4.1.16 for the latest maintenance and cumulative 
security fixes. Use the Apache OpenOffice [download 
page](https://www.openoffice.org/download/).
+
+**Acknowledgements**
+
+The Apache OpenOffice Security Team would like to thank Louis Bettels, from 
Technische Universität Braunschweig, for discovering and reporting this issue.
+
+**Further Information**
+
+For additional information and assistance, consult the [Apache OpenOffice 
Community Forums](https://forum.openoffice.org/) or make requests to the 
[email protected] public mailing list.
+
+The latest information on Apache OpenOffice security bulletins can be found at 
the [Bulletin Archive](https://www.openoffice.org/security/bulletin.html) page.
diff --git a/content/security/cves/CVE-2025-64406.md 
b/content/security/cves/CVE-2025-64406.md
new file mode 100644
index 0000000000..1b9651727e
--- /dev/null
+++ b/content/security/cves/CVE-2025-64406.md
@@ -0,0 +1,42 @@
+type=cve
+cve=CVE-2025-64406
+cvedesc=Possible memory corruption during CSV import
+cvefixed=4.1.16
+tags=weekly links, java
+status=published
+~~~~~~
+
+**Description**
+
+An out-of-bounds Write vulnerability in Apache OpenOffice could allow an 
attacker to craft a document that would crash the program, or otherwise corrupt 
other memory areas.
+
+This issue affects Apache OpenOffice: through 4.1.15.
+
+Users are recommended to upgrade to version 4.1.16, which fixes the issue.
+
+**Severity: Important**
+
+There are no known exploits of this vulnerability.  
+
+Thanks to the reporter for discovering this issue.
+
+**Vendor: The Apache Software Foundation**
+
+**Versions Affected**
+
+All Apache OpenOffice versions 4.1.15 and older are affected.  
+OpenOffice.org versions may also be affected.
+
+**Mitigation**
+
+Install Apache OpenOffice 4.1.16 for the latest maintenance and cumulative 
security fixes. Use the Apache OpenOffice [download 
page](https://www.openoffice.org/download/).
+
+**Acknowledgements**
+
+The Apache OpenOffice Security Team would like to thank Damjan Jovanovic for 
discovering and reporting this issue.
+
+**Further Information**
+
+For additional information and assistance, consult the [Apache OpenOffice 
Community Forums](https://forum.openoffice.org/) or make requests to the 
[email protected] public mailing list.
+
+The latest information on Apache OpenOffice security bulletins can be found at 
the [Bulletin Archive](https://www.openoffice.org/security/bulletin.html) page.
diff --git a/content/security/cves/CVE-2025-64407.md 
b/content/security/cves/CVE-2025-64407.md
new file mode 100644
index 0000000000..ae7222fd77
--- /dev/null
+++ b/content/security/cves/CVE-2025-64407.md
@@ -0,0 +1,46 @@
+type=cve
+cve=CVE-2025-64407
+cvedesc=URL fetching can be used to exfiltrate arbitrary INI file values and 
environment variables
+cvefixed=4.1.16
+tags=weekly links, java
+status=published
+~~~~~~
+
+**Description**
+
+Apache OpenOffice documents can contain links. A missing Authorization 
vulnerability in Apache OpenOffice allowed an attacker to craft a document that 
would cause external links to be loaded without prompt. Such links could also 
be used to transmit system information, such as environment variables or 
configuration settings.
+
+In the affected versions of Apache OpenOffice, documents that used a certain 
URI scheme linking to external files would load the contents of such files 
without prompting the user for permission to do so. Such URI scheme allows to 
include system configuration data, that is not supposed to be transmitted 
externally.
+
+This issue affects Apache OpenOffice: through 4.1.15.
+
+Users are recommended to upgrade to version 4.1.16, which fixes the issue.
+
+The LibreOffice suite reported this issue as CVE-2024-12426.
+
+**Severity: Moderate**
+
+There are no known exploits of this vulnerability.  
+
+Thanks to the reporter for discovering this issue.
+
+**Vendor: The Apache Software Foundation**
+
+**Versions Affected**
+
+All Apache OpenOffice versions 4.1.15 and older are affected.  
+OpenOffice.org versions may also be affected.
+
+**Mitigation**
+
+Install Apache OpenOffice 4.1.16 for the latest maintenance and cumulative 
security fixes. Use the Apache OpenOffice [download 
page](https://www.openoffice.org/download/).
+
+**Acknowledgements**
+
+The Apache OpenOffice Security Team would like to thank Thomas Rinsma of 
Codean Labs for discovering and reporting this issue.
+
+**Further Information**
+
+For additional information and assistance, consult the [Apache OpenOffice 
Community Forums](https://forum.openoffice.org/) or make requests to the 
[email protected] public mailing list.
+
+The latest information on Apache OpenOffice security bulletins can be found at 
the [Bulletin Archive](https://www.openoffice.org/security/bulletin.html) page.

Reply via email to