{"url":"http://public2.vulnerablecode.io/api/packages/85127?format=json","purl":"pkg:ebuild/sys-kernel/usermode-sources@2.4.24-r10","type":"ebuild","namespace":"sys-kernel","name":"usermode-sources","version":"2.4.24-r10","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.4.24_p0-r1","latest_non_vulnerable_version":"2.6.8","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60274?format=json","vulnerability_id":"VCID-xx3w-5nxf-bffb","summary":"Multiple information leaks have been found in the Linux kernel, allowing an\n    attacker to obtain sensitive data which may be used for further\n    exploitation of the system.","references":[{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U"},{"reference_url":"http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1058.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1058.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-1058","reference_id":"","reference_type":"","scores":[{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19674","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19854","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20002","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20061","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19788","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19868","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19922","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19931","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19887","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19829","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19803","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19819","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19715","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19707","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-1058"},{"reference_url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=152532"},{"reference_url":"http://secunia.com/advisories/18684","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18684"},{"reference_url":"http://secunia.com/advisories/19038","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19038"},{"reference_url":"http://secunia.com/advisories/19369","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19369"},{"reference_url":"http://secunia.com/advisories/19607","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19607"},{"reference_url":"http://secunia.com/advisories/21476","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/21476"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17151","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17151"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10427","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10427"},{"reference_url":"http://www.debian.org/security/2006/dsa-1018","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2006/dsa-1018"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:022","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:022"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-293.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-293.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2006-0190.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2006-0190.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2006-0191.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2006-0191.html"},{"reference_url":"http://www.securityfocus.com/bid/11052","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/11052"},{"reference_url":"http://www.securityfocus.com/bid/11937","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/11937"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617360","reference_id":"1617360","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617360"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2004-1058","reference_id":"CVE-2004-1058","reference_type":"","scores":[{"value":"1.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2004-1058"},{"reference_url":"https://security.gentoo.org/glsa/200408-24","reference_id":"GLSA-200408-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200408-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:293","reference_id":"RHSA-2005:293","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:293"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0190","reference_id":"RHSA-2006:0190","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0190"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0191","reference_id":"RHSA-2006:0191","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0191"},{"reference_url":"https://usn.ubuntu.com/38-1/","reference_id":"USN-38-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/38-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85124?format=json","purl":"pkg:ebuild/sys-kernel/usermode-sources@2.4.21-r12","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.4.21-r12"},{"url":"http://public2.vulnerablecode.io/api/packages/85125?format=json","purl":"pkg:ebuild/sys-kernel/usermode-sources@2.4.23-r12","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.4.23-r12"},{"url":"http://public2.vulnerablecode.io/api/packages/85126?format=json","purl":"pkg:ebuild/sys-kernel/usermode-sources@2.4.24-r4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.4.24-r4"},{"url":"http://public2.vulnerablecode.io/api/packages/85127?format=json","purl":"pkg:ebuild/sys-kernel/usermode-sources@2.4.24-r10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.4.24-r10"},{"url":"http://public2.vulnerablecode.io/api/packages/85128?format=json","purl":"pkg:ebuild/sys-kernel/usermode-sources@2.4.25_pre7-r11","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.4.25_pre7-r11"},{"url":"http://public2.vulnerablecode.io/api/packages/78575?format=json","purl":"pkg:ebuild/sys-kernel/usermode-sources@2.4.26-r3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.4.26-r3"},{"url":"http://public2.vulnerablecode.io/api/packages/85129?format=json","purl":"pkg:ebuild/sys-kernel/usermode-sources@2.4.26-r5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.4.26-r5"},{"url":"http://public2.vulnerablecode.io/api/packages/85130?format=json","purl":"pkg:ebuild/sys-kernel/usermode-sources@2.4.26-r9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.4.26-r9"},{"url":"http://public2.vulnerablecode.io/api/packages/85131?format=json","purl":"pkg:ebuild/sys-kernel/usermode-sources@2.4.26_p7-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.4.26_p7-r1"},{"url":"http://public2.vulnerablecode.io/api/packages/85132?format=json","purl":"pkg:ebuild/sys-kernel/usermode-sources@2.4.27-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.4.27-r1"},{"url":"http://public2.vulnerablecode.io/api/packages/85133?format=json","purl":"pkg:ebuild/sys-kernel/usermode-sources@2.4.27.2.0.1-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.4.27.2.0.1-r1"},{"url":"http://public2.vulnerablecode.io/api/packages/85134?format=json","purl":"pkg:ebuild/sys-kernel/usermode-sources@2.6.5-r5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.6.5-r5"},{"url":"http://public2.vulnerablecode.io/api/packages/85135?format=json","purl":"pkg:ebuild/sys-kernel/usermode-sources@2.6.6-r6","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.6.6-r6"},{"url":"http://public2.vulnerablecode.io/api/packages/85136?format=json","purl":"pkg:ebuild/sys-kernel/usermode-sources@2.6.6-r8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.6.6-r8"},{"url":"http://public2.vulnerablecode.io/api/packages/85137?format=json","purl":"pkg:ebuild/sys-kernel/usermode-sources@2.6.7-r5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.6.7-r5"},{"url":"http://public2.vulnerablecode.io/api/packages/85138?format=json","purl":"pkg:ebuild/sys-kernel/usermode-sources@2.6.7-r7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.6.7-r7"},{"url":"http://public2.vulnerablecode.io/api/packages/85139?format=json","purl":"pkg:ebuild/sys-kernel/usermode-sources@2.6.7-r12","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.6.7-r12"},{"url":"http://public2.vulnerablecode.io/api/packages/85140?format=json","purl":"pkg:ebuild/sys-kernel/usermode-sources@2.6.7_p0-r5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.6.7_p0-r5"},{"url":"http://public2.vulnerablecode.io/api/packages/85141?format=json","purl":"pkg:ebuild/sys-kernel/usermode-sources@2.6.7_p14-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.6.7_p14-r1"},{"url":"http://public2.vulnerablecode.io/api/packages/85142?format=json","purl":"pkg:ebuild/sys-kernel/usermode-sources@2.6.8_rc4-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.6.8_rc4-r1"},{"url":"http://public2.vulnerablecode.io/api/packages/85143?format=json","purl":"pkg:ebuild/sys-kernel/usermode-sources@2.6.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.6.8"}],"aliases":["CVE-2004-1058"],"risk_score":0.6,"exploitability":"0.5","weighted_severity":"1.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xx3w-5nxf-bffb"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-kernel/usermode-sources@2.4.24-r10"}