CVE Vulnerabilities

CVE-2020-27827

Uncontrolled Resource Consumption

Published: Mar 18, 2021 | Modified: Dec 03, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
7.1 HIGH
AV:N/AC:M/Au:N/C:N/I:N/A:C
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can cause memory to be lost when allocating data to handle specific optional TLVs, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

NameVendorStart VersionEnd Version
LldpdLldpd_project*1.0.8 (excluding)
OpenvswitchOpenvswitch2.6.0 (including)2.6.9 (excluding)
OpenvswitchOpenvswitch2.7.0 (including)2.7.12 (excluding)
OpenvswitchOpenvswitch2.8.0 (including)2.8.10 (excluding)
OpenvswitchOpenvswitch2.9.0 (including)2.9.8 (excluding)
OpenvswitchOpenvswitch2.10.0 (including)2.10.6 (excluding)
OpenvswitchOpenvswitch2.11.0 (including)2.11.5 (excluding)
OpenvswitchOpenvswitch2.12.0 (including)2.12.2 (excluding)
OpenvswitchOpenvswitch2.13.0 (including)2.13.2 (excluding)
OpenvswitchOpenvswitch2.14.0 (including)2.14.1 (excluding)
Fast Datapath for Red Hat Enterprise Linux 7RedHatopenvswitch2.11-0:2.11.3-86.el7fdp*
Fast Datapath for Red Hat Enterprise Linux 7RedHatopenvswitch2.13-0:2.13.0-81.el7fdp*
Fast Datapath for Red Hat Enterprise Linux 7RedHatopenvswitch-0:2.9.9-1.el7fdp*
Fast Datapath for Red Hat Enterprise Linux 8RedHatopenvswitch2.13-0:2.13.0-79.5.el8fdp*
Fast Datapath for Red Hat Enterprise Linux 8RedHatopenvswitch2.11-0:2.11.3-83.el8fdp*
Red Hat Enterprise Linux 9RedHatlldpd-0:1.0.18-4.el9*
Red Hat OpenStack Platform 13.0 (Queens)RedHatopenvswitch2.11-0:2.11.3-86.el7fdp*
Red Hat Virtualization 4.2 for Red Hat Enterprise Linux 7.6 EUSRedHatopenvswitch-0:2.9.9-1.el7fdp*
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7RedHatopenvswitch2.11-0:2.11.3-86.el7fdp*
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7RedHatovn2.11-0:2.11.1-57.el7fdp*
Red Hat Virtualization 4 for Red Hat Enterprise Linux 7RedHatredhat-virtualization-host-0:4.3.14-20210322.0.el7_9*
Red Hat Virtualization 4 for Red Hat Enterprise Linux 8RedHatredhat-virtualization-host-0:4.4.4-20210307.0.el8_3*
LldpdUbuntubionic*
LldpdUbuntufocal*
LldpdUbuntugroovy*
LldpdUbuntuhirsute*
LldpdUbuntuimpish*
LldpdUbuntukinetic*
LldpdUbuntulunar*
LldpdUbuntumantic*
LldpdUbuntuoracular*
LldpdUbuntuplucky*
LldpdUbuntutrusty*
LldpdUbuntuxenial*
OpenvswitchUbuntubionic*
OpenvswitchUbuntudevel*
OpenvswitchUbuntuesm-infra/bionic*
OpenvswitchUbuntuesm-infra/focal*
OpenvswitchUbuntuesm-infra/xenial*
OpenvswitchUbuntufocal*
OpenvswitchUbuntugroovy*
OpenvswitchUbuntuhirsute*
OpenvswitchUbuntuimpish*
OpenvswitchUbuntujammy*
OpenvswitchUbuntukinetic*
OpenvswitchUbuntulunar*
OpenvswitchUbuntumantic*
OpenvswitchUbuntunoble*
OpenvswitchUbuntuoracular*
OpenvswitchUbuntuplucky*
OpenvswitchUbuntuquesting*
OpenvswitchUbuntutrusty*
OpenvswitchUbuntuxenial*

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References