This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/openoffice-org.git


The following commit(s) were added to refs/heads/asf-site by this push:
     new e1bcd038a4 git-site-role commit from copy_staging.sh
e1bcd038a4 is described below

commit e1bcd038a4904fe12af3d8e8e29e569402cd643c
Author: jenkins <[email protected]>
AuthorDate: Tue Nov 11 22:17:09 2025 +0000

    git-site-role commit from copy_staging.sh
---
 content/feed.xml                          |  4 +-
 content/security/bulletin.html            | 12 ++++++
 content/security/cves/CVE-2025-64401.html | 61 +++++++++++++++++++++++++++++++
 content/security/cves/CVE-2025-64402.html | 60 ++++++++++++++++++++++++++++++
 content/security/cves/CVE-2025-64403.html | 60 ++++++++++++++++++++++++++++++
 content/security/cves/CVE-2025-64404.html | 60 ++++++++++++++++++++++++++++++
 content/security/cves/CVE-2025-64405.html | 60 ++++++++++++++++++++++++++++++
 content/security/cves/CVE-2025-64406.html | 59 ++++++++++++++++++++++++++++++
 content/security/cves/CVE-2025-64407.html | 61 +++++++++++++++++++++++++++++++
 9 files changed, 435 insertions(+), 2 deletions(-)

diff --git a/content/feed.xml b/content/feed.xml
index 6356f9f314..9357f8caa2 100644
--- a/content/feed.xml
+++ b/content/feed.xml
@@ -6,8 +6,8 @@
     <atom:link href="http://localhost:8820/feed.xml"; rel="self" 
type="application/rss+xml" />
     <description>OpenOffice.org Feed</description>
     <language>en-us</language>
-    <pubDate>Tue, 11 Nov 2025 13:32:59 +0000</pubDate>
-    <lastBuildDate>Tue, 11 Nov 2025 13:32:59 +0000</lastBuildDate>
+    <pubDate>Tue, 11 Nov 2025 22:01:44 +0000</pubDate>
+    <lastBuildDate>Tue, 11 Nov 2025 22:01:44 +0000</lastBuildDate>
     
 
   </channel> 
diff --git a/content/security/bulletin.html b/content/security/bulletin.html
index 627c87062b..f6a25a9887 100644
--- a/content/security/bulletin.html
+++ b/content/security/bulletin.html
@@ -38,6 +38,18 @@
     subscribe to our <a href="alerts.html">security-alerts mailing 
list</a>.</strong>
   </p>
 
+  <h3>Fixed in Apache OpenOffice 4.1.16</h3>
+
+  <ul>
+    <li><a href="cves/CVE-2025-64401.html">CVE-2025-64401</a>: Remote 
documents loaded without prompt via IFrame.</li>
+    <li><a href="cves/CVE-2025-64402.html">CVE-2025-64402</a>: Remote 
documents loaded without prompt via OLE objects.</li>
+    <li><a href="cves/CVE-2025-64403.html">CVE-2025-64403</a>: Remote 
documents loaded without prompt via "external data sources" in Calc.</li>
+    <li><a href="cves/CVE-2025-64404.html">CVE-2025-64404</a>: Remote 
documents loaded without prompt via background and bullet images.</li>
+    <li><a href="cves/CVE-2025-64405.html">CVE-2025-64405</a>: Remote 
documents loaded without prompt via DDE function.</li>
+    <li><a href="cves/CVE-2025-64406.html">CVE-2025-64406</a>: Possible memory 
corruption during CSV import.</li>
+    <li><a href="cves/CVE-2025-64407.html">CVE-2025-64407</a>: URL fetching 
can be used to exfiltrate arbitrary INI file values and environment 
variables.</li>
+  </ul>
+
   <h3>Fixed in Apache OpenOffice 4.1.15</h3>
 
   <ul>
diff --git a/content/security/cves/CVE-2025-64401.html 
b/content/security/cves/CVE-2025-64401.html
new file mode 100644
index 0000000000..db9e4b30e4
--- /dev/null
+++ b/content/security/cves/CVE-2025-64401.html
@@ -0,0 +1,61 @@
+
+<!--#include virtual="/doctype.html" -->
+<html>
+  <head>
+    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
+    
+    <title>CVE-2025-64401</title>
+    <link href="/css/ooo.css" rel="stylesheet" type="text/css">
+    
+    
+    
+    <script src="https://www.apachecon.com/event-images/snippet.js";></script>
+  </head>
+  <body>
+    <!--#include virtual="/brand.html" -->
+    <div id="topbara">
+      <!--#include virtual="/topnav.html" -->
+      <div id="breadcrumbsa"><a href="/">home</a>&nbsp;&raquo;&nbsp;<a 
href="/security/">security</a>&nbsp;&raquo;&nbsp;<a 
href="/security/cves/">cves</a></div>
+    </div>
+    <div id="clear"></div>
+      
+      
+      <div id="content">
+        <p><a 
href="https://www.cve.org/CVERecord?id=CVE-2025-64401";>CVE-2025-64401</a></p>
+        <p><a 
href="https://www.openoffice.org/security/cves/CVE-2025-64401.html";>Apache 
OpenOffice Advisory</a></p>
+        <p style="text-align:center; font-size:largest">Remote documents 
loaded without prompt via IFrame</p>
+        <p style="text-align:center;
+                  font-size:larger">Fixed in Apache OpenOffice 4.1.16</p>
+      
+      <p><strong>Description</strong></p>
+<p>Apache OpenOffice documents can contain links. A missing Authorization 
vulnerability in Apache OpenOffice allowed an attacker to craft a document that 
would cause external links to be loaded without prompt. In the affected 
versions of Apache OpenOffice, documents that used &ldquo;floating 
frames&rdquo; linked to external files would load the contents of those frames 
without prompting the user for permission to do so.</p>
+<p>This issue affects Apache OpenOffice: through 4.1.15.</p>
+<p>Users are recommended to upgrade to version 4.1.16, which fixes the 
issue.</p>
+<p>The LibreOffice suite reported this issue as CVE-2023-2255</p>
+<p><strong>Severity: Moderate</strong></p>
+<p>There are no known exploits of this vulnerability.<br />
+A proof-of-concept demonstration exists.</p>
+<p>Thanks to the reporter for discovering this issue.</p>
+<p><strong>Vendor: The Apache Software Foundation</strong></p>
+<p><strong>Versions Affected</strong></p>
+<p>All Apache OpenOffice versions 4.1.15 and older are affected.<br />
+OpenOffice.org versions may also be affected.</p>
+<p><strong>Mitigation</strong></p>
+<p>Install Apache OpenOffice 4.1.16 for the latest maintenance and cumulative 
security fixes. Use the Apache OpenOffice <a 
href="https://www.openoffice.org/download/";>download page</a>.</p>
+<p><strong>Acknowledgements</strong></p>
+<p>The Apache OpenOffice Security Team would like to thank Amel 
Bouziane-Leblond for discovering and reporting this issue.</p>
+<p><strong>Further Information</strong></p>
+<p>For additional information and assistance, consult the <a 
href="https://forum.openoffice.org/";>Apache OpenOffice Community Forums</a> or 
make requests to the <a 
href="&#x6d;&#x61;i&#108;&#116;&#111;&#58;&#117;&#x73;&#101;&#114;&#115;&#64;&#111;&#x70;&#101;&#x6e;&#111;&#102;&#102;i&#x63;&#x65;&#46;&#x61;&#x70;&#97;&#99;&#x68;&#x65;.o&#x72;&#x67;">u&#x73;&#101;&#x72;s&#64;&#111;&#112;&#x65;&#110;&#111;f&#x66;&#x69;c&#101;&#46;a&#112;a&#99;&#x68;&#101;&#x2e;&#111;&#x72;&#103;</a>
 public  [...]
+<p>The latest information on Apache OpenOffice security bulletins can be found 
at the <a href="https://www.openoffice.org/security/bulletin.html";>Bulletin 
Archive</a> page.</p>
+
+      
+       <hr />
+    <p>
+      <a href="https://security.openoffice.org";>Security Home</a>-&gt;
+      <a 
href="https://www.openoffice.org/security/bulletin.html";>Bulletin</a>-&gt;
+      <a 
href="https://www.openoffice.org/security/cves/CVE-2025-64401.html";>CVE-2025-64401</a>
+    </p>
+    </div>
+    <!--#include virtual="/footer.html" -->
+  </body>
+</html>
diff --git a/content/security/cves/CVE-2025-64402.html 
b/content/security/cves/CVE-2025-64402.html
new file mode 100644
index 0000000000..f77acaad13
--- /dev/null
+++ b/content/security/cves/CVE-2025-64402.html
@@ -0,0 +1,60 @@
+
+<!--#include virtual="/doctype.html" -->
+<html>
+  <head>
+    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
+    
+    <title>CVE-2025-64402</title>
+    <link href="/css/ooo.css" rel="stylesheet" type="text/css">
+    
+    
+    
+    <script src="https://www.apachecon.com/event-images/snippet.js";></script>
+  </head>
+  <body>
+    <!--#include virtual="/brand.html" -->
+    <div id="topbara">
+      <!--#include virtual="/topnav.html" -->
+      <div id="breadcrumbsa"><a href="/">home</a>&nbsp;&raquo;&nbsp;<a 
href="/security/">security</a>&nbsp;&raquo;&nbsp;<a 
href="/security/cves/">cves</a></div>
+    </div>
+    <div id="clear"></div>
+      
+      
+      <div id="content">
+        <p><a 
href="https://www.cve.org/CVERecord?id=CVE-2025-64402";>CVE-2025-64402</a></p>
+        <p><a 
href="https://www.openoffice.org/security/cves/CVE-2025-64402.html";>Apache 
OpenOffice Advisory</a></p>
+        <p style="text-align:center; font-size:largest">Remote documents 
loaded without prompt via OLE objects</p>
+        <p style="text-align:center;
+                  font-size:larger">Fixed in Apache OpenOffice 4.1.16</p>
+      
+      <p><strong>Description</strong></p>
+<p>Apache OpenOffice documents can contain links. A missing Authorization 
vulnerability in Apache OpenOffice allowed an attacker to craft a document that 
would cause external links to be loaded without prompt. In the affected 
versions of Apache OpenOffice, documents that used &ldquo;OLE objects&rdquo; 
linked to external files would load the contents of those files without 
prompting the user for permission to do so.</p>
+<p>This issue affects Apache OpenOffice: through 4.1.15.</p>
+<p>Users are recommended to upgrade to version 4.1.16, which fixes the 
issue.</p>
+<p><strong>Severity: Moderate</strong></p>
+<p>There are no known exploits of this vulnerability.<br />
+A proof-of-concept demonstration exists.</p>
+<p>Thanks to the reporter for discovering this issue.</p>
+<p><strong>Vendor: The Apache Software Foundation</strong></p>
+<p><strong>Versions Affected</strong></p>
+<p>All Apache OpenOffice versions 4.1.15 and older are affected.<br />
+OpenOffice.org versions may also be affected.</p>
+<p><strong>Mitigation</strong></p>
+<p>Install Apache OpenOffice 4.1.16 for the latest maintenance and cumulative 
security fixes. Use the Apache OpenOffice <a 
href="https://www.openoffice.org/download/";>download page</a>.</p>
+<p><strong>Acknowledgements</strong></p>
+<p>The Apache OpenOffice Security Team would like to thank Dawid Golunski, 
Doyensec LLC for discovering and reporting this issue.</p>
+<p><strong>Further Information</strong></p>
+<p>For additional information and assistance, consult the <a 
href="https://forum.openoffice.org/";>Apache OpenOffice Community Forums</a> or 
make requests to the <a 
href="&#109;&#97;&#x69;&#x6c;&#116;o&#x3a;&#117;&#x73;&#x65;&#x72;&#115;&#x40;&#111;&#112;&#101;&#x6e;&#111;f&#x66;&#105;&#x63;&#x65;&#x2e;&#x61;p&#x61;&#99;h&#101;&#46;&#x6f;&#114;g">&#x75;&#x73;&#101;&#x72;&#115;&#x40;op&#x65;&#110;&#x6f;&#102;f&#x69;&#99;&#x65;&#x2e;&#97;&#x70;a&#99;&#104;e&#46;&#x6f;r&#x67;</a>
 public mail [...]
+<p>The latest information on Apache OpenOffice security bulletins can be found 
at the <a href="https://www.openoffice.org/security/bulletin.html";>Bulletin 
Archive</a> page.</p>
+
+      
+       <hr />
+    <p>
+      <a href="https://security.openoffice.org";>Security Home</a>-&gt;
+      <a 
href="https://www.openoffice.org/security/bulletin.html";>Bulletin</a>-&gt;
+      <a 
href="https://www.openoffice.org/security/cves/CVE-2025-64402.html";>CVE-2025-64402</a>
+    </p>
+    </div>
+    <!--#include virtual="/footer.html" -->
+  </body>
+</html>
diff --git a/content/security/cves/CVE-2025-64403.html 
b/content/security/cves/CVE-2025-64403.html
new file mode 100644
index 0000000000..d2825db082
--- /dev/null
+++ b/content/security/cves/CVE-2025-64403.html
@@ -0,0 +1,60 @@
+
+<!--#include virtual="/doctype.html" -->
+<html>
+  <head>
+    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
+    
+    <title>CVE-2025-64403</title>
+    <link href="/css/ooo.css" rel="stylesheet" type="text/css">
+    
+    
+    
+    <script src="https://www.apachecon.com/event-images/snippet.js";></script>
+  </head>
+  <body>
+    <!--#include virtual="/brand.html" -->
+    <div id="topbara">
+      <!--#include virtual="/topnav.html" -->
+      <div id="breadcrumbsa"><a href="/">home</a>&nbsp;&raquo;&nbsp;<a 
href="/security/">security</a>&nbsp;&raquo;&nbsp;<a 
href="/security/cves/">cves</a></div>
+    </div>
+    <div id="clear"></div>
+      
+      
+      <div id="content">
+        <p><a 
href="https://www.cve.org/CVERecord?id=CVE-2025-64403";>CVE-2025-64403</a></p>
+        <p><a 
href="https://www.openoffice.org/security/cves/CVE-2025-64403.html";>Apache 
OpenOffice Advisory</a></p>
+        <p style="text-align:center; font-size:largest">Remote documents 
loaded without prompt via "external data sources" in Calc</p>
+        <p style="text-align:center;
+                  font-size:larger">Fixed in Apache OpenOffice 4.1.16</p>
+      
+      <p><strong>Description</strong></p>
+<p>Apache OpenOffice Calc spreadsheet can contain links to other files, in the 
form of &ldquo;external data sources&rdquo;. A missing Authorization 
vulnerability in Apache OpenOffice allowed an attacker to craft a document that 
would cause such links to be loaded without prompt.</p>
+<p>This issue affects Apache OpenOffice: through 4.1.15.</p>
+<p>Users are recommended to upgrade to version 4.1.16, which fixes the 
issue.</p>
+<p><strong>Severity: Moderate</strong></p>
+<p>There are no known exploits of this vulnerability.<br />
+A proof-of-concept demonstration exists.</p>
+<p>Thanks to the reporter for discovering this issue.</p>
+<p><strong>Vendor: The Apache Software Foundation</strong></p>
+<p><strong>Versions Affected</strong></p>
+<p>All Apache OpenOffice versions 4.1.15 and older are affected.<br />
+OpenOffice.org versions may also be affected.</p>
+<p><strong>Mitigation</strong></p>
+<p>Install Apache OpenOffice 4.1.16 for the latest maintenance and cumulative 
security fixes. Use the Apache OpenOffice <a 
href="https://www.openoffice.org/download/";>download page</a>.</p>
+<p><strong>Acknowledgements</strong></p>
+<p>The Apache OpenOffice Security Team would like to thank Reginaldo Silva of 
ubercomp.com for discovering and reporting this issue.</p>
+<p><strong>Further Information</strong></p>
+<p>For additional information and assistance, consult the <a 
href="https://forum.openoffice.org/";>Apache OpenOffice Community Forums</a> or 
make requests to the <a 
href="&#109;a&#x69;&#x6c;&#116;&#111;&#x3a;&#x75;&#x73;e&#114;&#115;&#64;o&#x70;&#101;&#x6e;&#111;&#102;&#x66;&#x69;&#99;&#101;&#x2e;&#97;&#112;&#x61;&#99;&#104;&#x65;.&#111;&#114;g">&#x75;s&#101;&#114;&#x73;&#x40;&#111;&#112;&#x65;&#110;&#x6f;&#x66;&#x66;&#x69;&#99;&#101;&#x2e;&#x61;p&#x61;&#99;&#104;&#x65;&#46;&#111;r&#103;<
 [...]
+<p>The latest information on Apache OpenOffice security bulletins can be found 
at the <a href="https://www.openoffice.org/security/bulletin.html";>Bulletin 
Archive</a> page.</p>
+
+      
+       <hr />
+    <p>
+      <a href="https://security.openoffice.org";>Security Home</a>-&gt;
+      <a 
href="https://www.openoffice.org/security/bulletin.html";>Bulletin</a>-&gt;
+      <a 
href="https://www.openoffice.org/security/cves/CVE-2025-64403.html";>CVE-2025-64403</a>
+    </p>
+    </div>
+    <!--#include virtual="/footer.html" -->
+  </body>
+</html>
diff --git a/content/security/cves/CVE-2025-64404.html 
b/content/security/cves/CVE-2025-64404.html
new file mode 100644
index 0000000000..231022e420
--- /dev/null
+++ b/content/security/cves/CVE-2025-64404.html
@@ -0,0 +1,60 @@
+
+<!--#include virtual="/doctype.html" -->
+<html>
+  <head>
+    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
+    
+    <title>CVE-2025-64404</title>
+    <link href="/css/ooo.css" rel="stylesheet" type="text/css">
+    
+    
+    
+    <script src="https://www.apachecon.com/event-images/snippet.js";></script>
+  </head>
+  <body>
+    <!--#include virtual="/brand.html" -->
+    <div id="topbara">
+      <!--#include virtual="/topnav.html" -->
+      <div id="breadcrumbsa"><a href="/">home</a>&nbsp;&raquo;&nbsp;<a 
href="/security/">security</a>&nbsp;&raquo;&nbsp;<a 
href="/security/cves/">cves</a></div>
+    </div>
+    <div id="clear"></div>
+      
+      
+      <div id="content">
+        <p><a 
href="https://www.cve.org/CVERecord?id=CVE-2025-64404";>CVE-2025-64404</a></p>
+        <p><a 
href="https://www.openoffice.org/security/cves/CVE-2025-64404.html";>Apache 
OpenOffice Advisory</a></p>
+        <p style="text-align:center; font-size:largest">Remote documents 
loaded without prompt via background and bullet images</p>
+        <p style="text-align:center;
+                  font-size:larger">Fixed in Apache OpenOffice 4.1.16</p>
+      
+      <p><strong>Description</strong></p>
+<p>Apache OpenOffice documents can contain links to other files. A missing 
Authorization vulnerability in Apache OpenOffice allowed an attacker to craft a 
document that would cause external links to be loaded without prompt. In the 
affected versions of Apache OpenOffice, documents that used background fill 
images, or bullet images, linked to external files would load the contents of 
those files without prompting the user for permission to do so.</p>
+<p>This issue affects Apache OpenOffice: through 4.1.15.</p>
+<p>Users are recommended to upgrade to version 4.1.16, which fixes the 
issue.</p>
+<p><strong>Severity: Moderate</strong></p>
+<p>There are no known exploits of this vulnerability.<br />
+A proof-of-concept demonstration exists.</p>
+<p>Thanks to the reporter for discovering this issue.</p>
+<p><strong>Vendor: The Apache Software Foundation</strong></p>
+<p><strong>Versions Affected</strong></p>
+<p>All Apache OpenOffice versions 4.1.15 and older are affected.<br />
+OpenOffice.org versions may also be affected.</p>
+<p><strong>Mitigation</strong></p>
+<p>Install Apache OpenOffice 4.1.16 for the latest maintenance and cumulative 
security fixes. Use the Apache OpenOffice <a 
href="https://www.openoffice.org/download/";>download page</a>.</p>
+<p><strong>Acknowledgements</strong></p>
+<p>The Apache OpenOffice Security Team would like to thank Reginaldo Silva of 
ubercomp.com for discovering and reporting this issue.</p>
+<p><strong>Further Information</strong></p>
+<p>For additional information and assistance, consult the <a 
href="https://forum.openoffice.org/";>Apache OpenOffice Community Forums</a> or 
make requests to the <a 
href="&#x6d;&#97;&#x69;&#108;&#x74;o&#x3a;&#x75;&#115;&#x65;&#x72;&#x73;&#64;&#x6f;&#x70;&#101;&#x6e;&#111;f&#102;i&#x63;&#x65;&#x2e;&#97;&#112;&#97;&#99;&#104;&#101;.&#111;&#x72;&#103;">&#x75;&#x73;e&#x72;&#x73;&#x40;&#111;p&#x65;&#x6e;&#111;&#x66;&#x66;&#105;&#99;&#x65;&#x2e;&#97;&#112;&#97;c&#x68;&#101;&#x2e;o&#x72;&#x67;</
 [...]
+<p>The latest information on Apache OpenOffice security bulletins can be found 
at the <a href="https://www.openoffice.org/security/bulletin.html";>Bulletin 
Archive</a> page.</p>
+
+      
+       <hr />
+    <p>
+      <a href="https://security.openoffice.org";>Security Home</a>-&gt;
+      <a 
href="https://www.openoffice.org/security/bulletin.html";>Bulletin</a>-&gt;
+      <a 
href="https://www.openoffice.org/security/cves/CVE-2025-64404.html";>CVE-2025-64404</a>
+    </p>
+    </div>
+    <!--#include virtual="/footer.html" -->
+  </body>
+</html>
diff --git a/content/security/cves/CVE-2025-64405.html 
b/content/security/cves/CVE-2025-64405.html
new file mode 100644
index 0000000000..9d588fe1c5
--- /dev/null
+++ b/content/security/cves/CVE-2025-64405.html
@@ -0,0 +1,60 @@
+
+<!--#include virtual="/doctype.html" -->
+<html>
+  <head>
+    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
+    
+    <title>CVE-2025-64405</title>
+    <link href="/css/ooo.css" rel="stylesheet" type="text/css">
+    
+    
+    
+    <script src="https://www.apachecon.com/event-images/snippet.js";></script>
+  </head>
+  <body>
+    <!--#include virtual="/brand.html" -->
+    <div id="topbara">
+      <!--#include virtual="/topnav.html" -->
+      <div id="breadcrumbsa"><a href="/">home</a>&nbsp;&raquo;&nbsp;<a 
href="/security/">security</a>&nbsp;&raquo;&nbsp;<a 
href="/security/cves/">cves</a></div>
+    </div>
+    <div id="clear"></div>
+      
+      
+      <div id="content">
+        <p><a 
href="https://www.cve.org/CVERecord?id=CVE-2025-64405";>CVE-2025-64405</a></p>
+        <p><a 
href="https://www.openoffice.org/security/cves/CVE-2025-64405.html";>Apache 
OpenOffice Advisory</a></p>
+        <p style="text-align:center; font-size:largest">Remote documents 
loaded without prompt via DDE function</p>
+        <p style="text-align:center;
+                  font-size:larger">Fixed in Apache OpenOffice 4.1.16</p>
+      
+      <p><strong>Description</strong></p>
+<p>Apache OpenOffice documents can contain links. A missing Authorization 
vulnerability in Apache OpenOffice allowed an attacker to craft a document that 
would cause external links to be loaded without prompt. In the affected 
versions of Apache OpenOffice, Calc spreadsheet containing DDE links to 
external files would load the contents of those files without prompting the 
user for permission to do so.</p>
+<p>This issue affects Apache OpenOffice: through 4.1.15.</p>
+<p>Users are recommended to upgrade to version 4.1.16, which fixes the 
issue.</p>
+<p><strong>Severity: Moderate</strong></p>
+<p>There are no known exploits of this vulnerability.<br />
+A proof-of-concept demonstration exists.</p>
+<p>Thanks to the reporter for discovering this issue.</p>
+<p><strong>Vendor: The Apache Software Foundation</strong></p>
+<p><strong>Versions Affected</strong></p>
+<p>All Apache OpenOffice versions 4.1.15 and older are affected.<br />
+OpenOffice.org versions may also be affected.</p>
+<p><strong>Mitigation</strong></p>
+<p>Install Apache OpenOffice 4.1.16 for the latest maintenance and cumulative 
security fixes. Use the Apache OpenOffice <a 
href="https://www.openoffice.org/download/";>download page</a>.</p>
+<p><strong>Acknowledgements</strong></p>
+<p>The Apache OpenOffice Security Team would like to thank Louis Bettels, from 
Technische Universität Braunschweig, for discovering and reporting this 
issue.</p>
+<p><strong>Further Information</strong></p>
+<p>For additional information and assistance, consult the <a 
href="https://forum.openoffice.org/";>Apache OpenOffice Community Forums</a> or 
make requests to the <a 
href="&#109;&#97;&#105;&#108;&#x74;&#111;&#x3a;&#117;&#x73;&#101;r&#x73;&#64;&#111;p&#x65;&#x6e;&#x6f;&#102;&#102;i&#99;&#x65;.a&#112;&#x61;&#99;&#x68;&#101;&#x2e;o&#114;&#103;">&#x75;&#x73;&#101;&#x72;&#115;@&#111;&#x70;e&#110;&#x6f;&#x66;f&#x69;&#x63;e&#46;&#97;&#x70;&#97;&#x63;&#x68;&#101;&#x2e;&#111;r&#103;</a>
 public mail [...]
+<p>The latest information on Apache OpenOffice security bulletins can be found 
at the <a href="https://www.openoffice.org/security/bulletin.html";>Bulletin 
Archive</a> page.</p>
+
+      
+       <hr />
+    <p>
+      <a href="https://security.openoffice.org";>Security Home</a>-&gt;
+      <a 
href="https://www.openoffice.org/security/bulletin.html";>Bulletin</a>-&gt;
+      <a 
href="https://www.openoffice.org/security/cves/CVE-2025-64405.html";>CVE-2025-64405</a>
+    </p>
+    </div>
+    <!--#include virtual="/footer.html" -->
+  </body>
+</html>
diff --git a/content/security/cves/CVE-2025-64406.html 
b/content/security/cves/CVE-2025-64406.html
new file mode 100644
index 0000000000..d74db12309
--- /dev/null
+++ b/content/security/cves/CVE-2025-64406.html
@@ -0,0 +1,59 @@
+
+<!--#include virtual="/doctype.html" -->
+<html>
+  <head>
+    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
+    
+    <title>CVE-2025-64406</title>
+    <link href="/css/ooo.css" rel="stylesheet" type="text/css">
+    
+    
+    
+    <script src="https://www.apachecon.com/event-images/snippet.js";></script>
+  </head>
+  <body>
+    <!--#include virtual="/brand.html" -->
+    <div id="topbara">
+      <!--#include virtual="/topnav.html" -->
+      <div id="breadcrumbsa"><a href="/">home</a>&nbsp;&raquo;&nbsp;<a 
href="/security/">security</a>&nbsp;&raquo;&nbsp;<a 
href="/security/cves/">cves</a></div>
+    </div>
+    <div id="clear"></div>
+      
+      
+      <div id="content">
+        <p><a 
href="https://www.cve.org/CVERecord?id=CVE-2025-64406";>CVE-2025-64406</a></p>
+        <p><a 
href="https://www.openoffice.org/security/cves/CVE-2025-64406.html";>Apache 
OpenOffice Advisory</a></p>
+        <p style="text-align:center; font-size:largest">Possible memory 
corruption during CSV import</p>
+        <p style="text-align:center;
+                  font-size:larger">Fixed in Apache OpenOffice 4.1.16</p>
+      
+      <p><strong>Description</strong></p>
+<p>An out-of-bounds Write vulnerability in Apache OpenOffice could allow an 
attacker to craft a document that would crash the program, or otherwise corrupt 
other memory areas.</p>
+<p>This issue affects Apache OpenOffice: through 4.1.15.</p>
+<p>Users are recommended to upgrade to version 4.1.16, which fixes the 
issue.</p>
+<p><strong>Severity: Important</strong></p>
+<p>There are no known exploits of this vulnerability.</p>
+<p>Thanks to the reporter for discovering this issue.</p>
+<p><strong>Vendor: The Apache Software Foundation</strong></p>
+<p><strong>Versions Affected</strong></p>
+<p>All Apache OpenOffice versions 4.1.15 and older are affected.<br />
+OpenOffice.org versions may also be affected.</p>
+<p><strong>Mitigation</strong></p>
+<p>Install Apache OpenOffice 4.1.16 for the latest maintenance and cumulative 
security fixes. Use the Apache OpenOffice <a 
href="https://www.openoffice.org/download/";>download page</a>.</p>
+<p><strong>Acknowledgements</strong></p>
+<p>The Apache OpenOffice Security Team would like to thank Damjan Jovanovic 
for discovering and reporting this issue.</p>
+<p><strong>Further Information</strong></p>
+<p>For additional information and assistance, consult the <a 
href="https://forum.openoffice.org/";>Apache OpenOffice Community Forums</a> or 
make requests to the <a 
href="&#x6d;&#97;&#105;&#x6c;t&#x6f;&#x3a;&#117;&#x73;&#x65;&#x72;&#x73;&#64;&#x6f;&#x70;en&#111;&#102;&#x66;&#x69;&#99;&#101;.&#x61;&#112;&#97;&#99;&#x68;&#101;&#x2e;&#x6f;r&#x67;">u&#x73;&#x65;&#x72;s&#x40;&#111;penof&#102;&#x69;&#x63;&#x65;&#46;&#x61;&#x70;&#97;c&#x68;e.&#111;&#114;&#x67;</a>
 public mailing list.</p>
+<p>The latest information on Apache OpenOffice security bulletins can be found 
at the <a href="https://www.openoffice.org/security/bulletin.html";>Bulletin 
Archive</a> page.</p>
+
+      
+       <hr />
+    <p>
+      <a href="https://security.openoffice.org";>Security Home</a>-&gt;
+      <a 
href="https://www.openoffice.org/security/bulletin.html";>Bulletin</a>-&gt;
+      <a 
href="https://www.openoffice.org/security/cves/CVE-2025-64406.html";>CVE-2025-64406</a>
+    </p>
+    </div>
+    <!--#include virtual="/footer.html" -->
+  </body>
+</html>
diff --git a/content/security/cves/CVE-2025-64407.html 
b/content/security/cves/CVE-2025-64407.html
new file mode 100644
index 0000000000..ca7a7d6a8f
--- /dev/null
+++ b/content/security/cves/CVE-2025-64407.html
@@ -0,0 +1,61 @@
+
+<!--#include virtual="/doctype.html" -->
+<html>
+  <head>
+    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
+    
+    <title>CVE-2025-64407</title>
+    <link href="/css/ooo.css" rel="stylesheet" type="text/css">
+    
+    
+    
+    <script src="https://www.apachecon.com/event-images/snippet.js";></script>
+  </head>
+  <body>
+    <!--#include virtual="/brand.html" -->
+    <div id="topbara">
+      <!--#include virtual="/topnav.html" -->
+      <div id="breadcrumbsa"><a href="/">home</a>&nbsp;&raquo;&nbsp;<a 
href="/security/">security</a>&nbsp;&raquo;&nbsp;<a 
href="/security/cves/">cves</a></div>
+    </div>
+    <div id="clear"></div>
+      
+      
+      <div id="content">
+        <p><a 
href="https://www.cve.org/CVERecord?id=CVE-2025-64407";>CVE-2025-64407</a></p>
+        <p><a 
href="https://www.openoffice.org/security/cves/CVE-2025-64407.html";>Apache 
OpenOffice Advisory</a></p>
+        <p style="text-align:center; font-size:largest">URL fetching can be 
used to exfiltrate arbitrary INI file values and environment variables</p>
+        <p style="text-align:center;
+                  font-size:larger">Fixed in Apache OpenOffice 4.1.16</p>
+      
+      <p><strong>Description</strong></p>
+<p>Apache OpenOffice documents can contain links. A missing Authorization 
vulnerability in Apache OpenOffice allowed an attacker to craft a document that 
would cause external links to be loaded without prompt. Such links could also 
be used to transmit system information, such as environment variables or 
configuration settings.</p>
+<p>In the affected versions of Apache OpenOffice, documents that used a 
certain URI scheme linking to external files would load the contents of such 
files without prompting the user for permission to do so. Such URI scheme 
allows to include system configuration data, that is not supposed to be 
transmitted externally.</p>
+<p>This issue affects Apache OpenOffice: through 4.1.15.</p>
+<p>Users are recommended to upgrade to version 4.1.16, which fixes the 
issue.</p>
+<p>The LibreOffice suite reported this issue as CVE-2024-12426.</p>
+<p><strong>Severity: Moderate</strong></p>
+<p>There are no known exploits of this vulnerability.</p>
+<p>Thanks to the reporter for discovering this issue.</p>
+<p><strong>Vendor: The Apache Software Foundation</strong></p>
+<p><strong>Versions Affected</strong></p>
+<p>All Apache OpenOffice versions 4.1.15 and older are affected.<br />
+OpenOffice.org versions may also be affected.</p>
+<p><strong>Mitigation</strong></p>
+<p>Install Apache OpenOffice 4.1.16 for the latest maintenance and cumulative 
security fixes. Use the Apache OpenOffice <a 
href="https://www.openoffice.org/download/";>download page</a>.</p>
+<p><strong>Acknowledgements</strong></p>
+<p>The Apache OpenOffice Security Team would like to thank Thomas Rinsma of 
Codean Labs for discovering and reporting this issue.</p>
+<p><strong>Further Information</strong></p>
+<p>For additional information and assistance, consult the <a 
href="https://forum.openoffice.org/";>Apache OpenOffice Community Forums</a> or 
make requests to the <a 
href="&#x6d;&#97;&#105;&#x6c;&#x74;&#x6f;:&#117;&#115;e&#x72;&#115;&#x40;&#x6f;&#112;&#x65;&#110;of&#102;&#x69;&#x63;&#101;&#46;&#x61;&#112;&#x61;&#x63;&#x68;&#101;.o&#x72;g">&#117;&#x73;&#101;&#114;&#x73;&#64;&#111;&#x70;&#x65;n&#x6f;f&#102;&#x69;&#x63;&#x65;&#x2e;&#97;&#x70;&#x61;c&#104;&#x65;&#46;&#111;&#x72;&#x67;</a>
 publ [...]
+<p>The latest information on Apache OpenOffice security bulletins can be found 
at the <a href="https://www.openoffice.org/security/bulletin.html";>Bulletin 
Archive</a> page.</p>
+
+      
+       <hr />
+    <p>
+      <a href="https://security.openoffice.org";>Security Home</a>-&gt;
+      <a 
href="https://www.openoffice.org/security/bulletin.html";>Bulletin</a>-&gt;
+      <a 
href="https://www.openoffice.org/security/cves/CVE-2025-64407.html";>CVE-2025-64407</a>
+    </p>
+    </div>
+    <!--#include virtual="/footer.html" -->
+  </body>
+</html>

Reply via email to