Bugzilla – Bug 1195227
VUL-0: CVE-2020-29050: sphinx: sphinxsearch -- security update
Last modified: 2022-03-01 20:17:59 UTC
CVE-2020-29050 SphinxSearch in Sphinx Technologies Sphinx through 3.1.1 allows directory traversal (in conjunction with CVE-2019-14511) because the mysql client can be used for CALL SNIPPETS and load_file operations on a full pathname (e.g., a file in the /etc directory). NOTE: this is unrelated to CMUSphinx. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-29050 http://www.debian.org/security/-1/dsa-5036 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29050 http://www.cvedetails.com/cve/CVE-2020-29050/ https://security-tracker.debian.org/tracker/CVE-2020-29050 https://blog.wirhabenstil.de/2019/08/19/sphinxsearch-0-0-0-09306-cve-2019-14511/
Fix in progress at https://build.opensuse.org/repositories/home:bruno_friedmann:branches:server:search/sphinx
Fixes in Factory https://build.opensuse.org/request/show/949725 Maintenance sent for openSUSE:Leap:15.3:Update https://build.opensuse.org/request/show/950028 For openSUSE:Leap:15.4:Update https://build.opensuse.org/request/show/950029
openSUSE-SU-2022:0046-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 1195227 CVE References: CVE-2020-29050 JIRA References: Sources used: openSUSE Leap 15.4 (src): sphinx-2.2.11-lp154.3.3.1
openSUSE-SU-2022:0054-1: An update that solves one vulnerability and has one errata is now available. Category: security (moderate) Bug References: 1157590,1195227 CVE References: CVE-2020-29050 JIRA References: Sources used: openSUSE Leap 15.3 (src): sphinx-2.2.11-lp153.2.3.1