{"api_version":"1","generated_at":"2026-04-24T01:10:20+00:00","cve":"CVE-2006-1855","urls":{"html":"https://cve.report/CVE-2006-1855","api":"https://cve.report/api/cve/CVE-2006-1855.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-1855","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-1855"},"summary":{"title":"CVE-2006-1855","description":"choose_new_parent in Linux kernel before 2.6.11.12 includes certain debugging code, which allows local users to cause a denial of service (panic) by causing certain circumstances involving termination of a parent process.","state":"PUBLISHED","assigner":"redhat","published_at":"2006-05-18 19:06:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"2.1","severity":"","vector":"AV:L/AC:L/Au:N/C:N/I:N/A:P","data":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://www.ubuntu.com/usn/usn-302-1","name":"http://www.ubuntu.com/usn/usn-302-1","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"usn/usn-302-1 - Ubuntu: Linux for human beings","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/20716","name":"http://secunia.com/advisories/20716","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Ubuntu update for kernel - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/22093","name":"http://secunia.com/advisories/22093","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Debian update for kernel-source-2.6.8 - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=127302","name":"https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=127302","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"text/x-diff","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/20237","name":"http://secunia.com/advisories/20237","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Red Hat update for kernel - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2006/dsa-1184","name":"http://www.debian.org/security/2006/dsa-1184","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Debian -- Security Information -- DSA-1184-2 kernel-source-2.6.8","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm","name":"http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"ASA-2006-161 (RHSA-2006-0493)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11235","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11235","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.redhat.com/support/errata/RHSA-2006-0493.html","name":"http://www.redhat.com/support/errata/RHSA-2006-0493.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"rhn.redhat.com | Red Hat Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.novell.com/linux/security/advisories/2006_42_kernel.html","name":"http://www.novell.com/linux/security/advisories/2006_42_kernel.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Security Announcement","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://secunia.com/advisories/21179","name":"http://secunia.com/advisories/21179","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SUSE update for kernel - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/21745","name":"http://secunia.com/advisories/21745","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Avaya Products Linux Kernel Multiple Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/18099","name":"http://www.securityfocus.com/bid/18099","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Linux Kernel Choose_New_Parent Local Denial of Service Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-1855","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-1855","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"1855","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"2.6.11.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"1855","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"2.6.11.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"1855","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"2.6.11.11","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"1855","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"2.6.11.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"1855","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"2.6.11.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"1855","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"2.6.11.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"1855","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"2.6.11.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"1855","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"2.6.11.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"1855","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"2.6.11.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"1855","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"2.6.11.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"1855","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"2.6.11.9","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2006","cve_id":"1855","cve":"CVE-2006-1855","epss":"0.000890000","percentile":"0.252930000","score_date":"2026-04-20","updated_at":"2026-04-21 00:07:48"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T17:27:29.506Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm"},{"name":"RHSA-2006:0493","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2006-0493.html"},{"name":"SUSE-SA:2006:042","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://www.novell.com/linux/security/advisories/2006_42_kernel.html"},{"name":"20716","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/20716"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=127302"},{"name":"21745","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/21745"},{"name":"USN-302-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/usn-302-1"},{"name":"20237","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/20237"},{"name":"22093","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/22093"},{"name":"DSA-1184","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2006/dsa-1184"},{"name":"21179","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/21179"},{"name":"18099","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/18099"},{"name":"oval:org.mitre.oval:def:11235","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11235"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2006-05-18T00:00:00.000Z","descriptions":[{"lang":"en","value":"choose_new_parent in Linux kernel before 2.6.11.12 includes certain debugging code, which allows local users to cause a denial of service (panic) by causing certain circumstances involving termination of a parent process."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-10-10T00:57:01.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm"},{"name":"RHSA-2006:0493","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2006-0493.html"},{"name":"SUSE-SA:2006:042","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://www.novell.com/linux/security/advisories/2006_42_kernel.html"},{"name":"20716","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/20716"},{"tags":["x_refsource_MISC"],"url":"https://bugzilla.redhat.com/bugzilla/attachment.cgi?id=127302"},{"name":"21745","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/21745"},{"name":"USN-302-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/usn-302-1"},{"name":"20237","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/20237"},{"name":"22093","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/22093"},{"name":"DSA-1184","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2006/dsa-1184"},{"name":"21179","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/21179"},{"name":"18099","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/18099"},{"name":"oval:org.mitre.oval:def:11235","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11235"}]}},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2006-1855","datePublished":"2006-05-18T19:00:00.000Z","dateReserved":"2006-04-19T00:00:00.000Z","dateUpdated":"2024-08-07T17:27:29.506Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2006-05-18 19:06:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*","matchCriteriaId":"1CD39A7A-9172-4B85-B8FE-CEB94207A897"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*","matchCriteriaId":"35F5C369-6BFB-445F-AA8B-6F6FA7C33EF3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*","matchCriteriaId":"81DE32C2-5B07-4812-9F88-000F5FB000C2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*","matchCriteriaId":"02EED3D5-8F89-4B7F-A34B-52274B1A754F"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*","matchCriteriaId":"5F87AA89-F377-4BEB-B69F-809F5DA6176C"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*","matchCriteriaId":"C27AF62E-A026-43E9-89E6-CD807CE9DF51"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*","matchCriteriaId":"79C2AE0E-DAE8-4443-B33F-6ABA9019AA88"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*","matchCriteriaId":"D343B121-C007-49F8-9DE8-AA05CE58FF0B"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*","matchCriteriaId":"7936B7EE-9CD1-4698-AD67-C619D0171A88"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*","matchCriteriaId":"A1A2AA2D-5183-4C49-A59D-AEB7D9B5A69E"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*","matchCriteriaId":"3A0370A2-0A23-4E34-A2AC-8D87D051B0B1"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"1855","Ordinal":"1","Title":"CVE-2006-1855","CVE":"CVE-2006-1855","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"1855","Ordinal":"1","NoteData":"choose_new_parent in Linux kernel before 2.6.11.12 includes certain debugging code, which allows local users to cause a denial of service (panic) by causing certain circumstances involving termination of a parent process.","Type":"Description","Title":"CVE-2006-1855"},{"CveYear":"2006","CveId":"1855","Ordinal":"2","NoteData":"2006-05-18","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"1855","Ordinal":"3","NoteData":"2017-10-09","Type":"Other","Title":"Modified"}]}}}