Current Description

The bond_select_queue function in drivers/net/bonding/bond_main.c in the Linux kernel before 2.6.39, when a network device with a large number of receive queues is installed but the default tx_queues setting is used, does not properly restrict queue indexes, which allows remote attackers to cause a denial of service (BUG and system crash) or possibly have unspecified other impact by sending network traffic.

Basic Data

PublishedMay 26, 2011
Last ModifiedJuly 29, 2020
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-20
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:P/A:C
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score9.0
Exploitability Score10.0
Impact Score8.5
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.


  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSLinuxLinux Kernel********2.6.39

Vulnerable Software List

Linux Linux Kernel *


NameSourceURLTags;a=commit;h=fd0e435b0fe85622f167b84432552885a4856ac8;a=commit;h=fd0e435b0fe85622f167b844CONFIRMPATCH Vendor Advisory
[oss-security] 20110413 Re: CVE request - kernel: bonding: Incorrect TX queue offset List PATCH Third Party Advisory
[oss-security] 20110413 CVE request - kernel: bonding: Incorrect TX queue offset List PATCH Third Party Advisory
1025558 Party Advisory VDB Entry Notes Vendor Advisory Tracking Third Party Advisory