CVE-2020-6096
NixOS vulnerability analysis and mitigation

Overview

A signed comparison vulnerability (CVE-2020-6096) was discovered in the ARMv7 memcpy() implementation of GNU glibc. The vulnerability was discovered by Jason Royes and Samuel Dytrych of Cisco Security Assessment and Penetration Team and publicly disclosed on May 21, 2020. The vulnerability affects GNU glibc version 2.30.9000 and earlier versions running on ARMv7 targets (Talos Report).

Technical details

The vulnerability occurs because the ARMv7 memcpy() implementation incorrectly handles the size_t data type for the 'num' parameter. Instead of treating size_t as unsigned, it uses signed branch and arithmetic operations. When memcpy() is called with a negative value for the 'num' parameter, the signed comparison results in incorrect behavior. The vulnerability has a CVSSv3 score of 8.1 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) and is classified as CWE-195 (Signed to Unsigned Conversion Error) (Talos Report).

Impact

If an attacker underflows the 'num' parameter to memcpy(), this vulnerability could lead to undefined behavior such as writing to out-of-bounds memory and potentially remote code execution. Furthermore, this implementation allows program execution to continue in scenarios where a segmentation fault or crash should have occurred, leading to execution with corrupted data (Talos Report).

Mitigation and workarounds

The fix involves replacing signed branch operations with unsigned equivalents throughout the ARMv7 memcpy() implementation. Instead of using 'bge' (signed branch), the implementation should use 'bhs/bcs' (unsigned greater than or equal comparison) to ensure the num parameter is treated as unsigned. The fix was included in glibc version 2.32, released on August 3rd, 2020 (Sourceware Bug).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22783HIGH8.1
  • NixOSNixOS
  • iris
NoYesJan 12, 2026
CVE-2026-0821MEDIUM6.9
  • NixOSNixOS
  • quickjs
NoNoJan 10, 2026
CVE-2025-68949MEDIUM5.3
  • NixOSNixOS
  • n8n
NoYesJan 13, 2026
CVE-2026-22784LOW2.3
  • NixOSNixOS
  • lychee
NoYesJan 12, 2026
CVE-2026-23497LOW1.3
  • NixOSNixOS
  • learning
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management