{"id":"CVE-2020-7062","details":"In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when using file upload functionality, if upload progress tracking is enabled, but session.upload_progress.cleanup is set to 0 (disabled), and the file upload fails, the upload procedure would try to clean up data that does not exist and encounter null pointer dereference, which would likely lead to a crash.","aliases":["BIT-libphp-2020-7062","BIT-php-2020-7062","BIT-php-min-2020-7062"],"modified":"2026-05-15T12:04:07.967002387Z","published":"2020-02-27T21:15:19.037Z","related":["ALSA-2020:3662","SUSE-SU-2020:0622-1","SUSE-SU-2020:0647-1","SUSE-SU-2020:0658-1","SUSE-SU-2022:4067-1","openSUSE-SU-2020:0341-1","openSUSE-SU-2024:11167-1","openSUSE-SU-2024:11169-1"],"database_specific":{"unresolved_ranges":[{"cpes":["cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"12.04"},{"last_affected":"14.04"},{"last_affected":"16.04"},{"last_affected":"18.04"},{"last_affected":"19.10"}],"source":"CPE_FIELD","vendor_product":"canonical:ubuntu_linux"},{"cpes":["cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"8.0"},{"last_affected":"9.0"},{"last_affected":"10.0"}],"source":"CPE_FIELD","vendor_product":"debian:debian_linux"},{"cpes":["cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"15.1"}],"source":"CPE_FIELD","vendor_product":"opensuse:leap"}]},"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202003-57"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4330-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4717"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4719"},{"type":"ADVISORY","url":"https://www.tenable.com/security/tns-2021-14"},{"type":"EVIDENCE","url":"https://bugs.php.net/bug.php?id=79221"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}