2521fbc4ade31e1d99d06193b0b73677512de8f1b1afaa577d3edd988f4833f6
449a97416d27ef58e048736f569629461730e1fa
1bb0661af301b8b5c796a39e4c8eabb1
5.10.158-2
hyperv-daemons_5.10.158-2_i386.deb
630
DEB
linux
I386
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
lsb-base, libc6 (>= 2.28)
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
hv_vss_daemon /usr/sbin/hv_vss_daemon | 13952 | 0 | ||
hv_kvp_daemon /usr/sbin/hv_kvp_daemon | 26352 | 0 | ||
hv_fcopy_daemon /usr/sbin/hv_fcopy_daemon | 13888 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-2873 | 55 | DSA DSA-5324-1 | hyperv-daemons 5.10.162-1 |
CVE-2022-3545 | 78 | DSA DSA-5324-1 | hyperv-daemons 5.10.162-1 |
CVE-2022-3623 | 8 | DSA DSA-5324-1 | hyperv-daemons 5.10.162-1 |
CVE-2022-4696 | 0 | DSA DSA-5324-1 | hyperv-daemons 5.10.162-1 |
CVE-2022-36280 | 55 | DSA DSA-5324-1 | hyperv-daemons 5.10.162-1 |
CVE-2022-41218 | 55 | DSA DSA-5324-1 | hyperv-daemons 5.10.162-1 |
CVE-2022-45934 | 8 | DSA DSA-5324-1 | hyperv-daemons 5.10.162-1 |
CVE-2022-47929 | 6 | DSA DSA-5324-1 | hyperv-daemons 5.10.162-1 |
CVE-2023-0179 | 8 | DSA DSA-5324-1 | hyperv-daemons 5.10.162-1 |
CVE-2023-0266 | 8 | DSA DSA-5324-1 | hyperv-daemons 5.10.162-1 |
CVE-2023-0394 | 6 | DSA DSA-5324-1 | hyperv-daemons 5.10.162-1 |
CVE-2023-23454 | 0 | DSA DSA-5324-1 | hyperv-daemons 5.10.162-1 |
CVE-2023-23455 | 0 | DSA DSA-5324-1 | hyperv-daemons 5.10.162-1 |
{ "sha256": "2521fbc4ade31e1d99d06193b0b73677512de8f1b1afaa577d3edd988f4833f6", "sha1": "449a97416d27ef58e048736f569629461730e1fa", "md5": "1bb0661af301b8b5c796a39e4c8eabb1", "type": "DEB", "arch": "I386", "name": "hyperv-daemons", "filename": "hyperv-daemons_5.10.158-2_i386.deb", "size": 630, "description": "Support daemons for Linux running on Hyper-V\nSuite of daemons for Linux guests running on Hyper-V, consisting of\nhv_fcopy_daemon, hv_kvp_daemon and hv_vss_daemon.\n\nhv_fcopy_daemon provides the file copy service, allowing the host to copy\nfiles into the guest.\n\nhv_kvp_daemon provides the key-value pair (KVP) service, allowing the host\nto get and set the IP networking configuration of the guest. (This\nrequires helper scripts which are not currently included.)\n\nhv_vss_daemon provides the volume shadow copy service (VSS), allowing the\nhost to freeze the guest filesystems while taking a snapshot.", "url": "https://www.kernel.org/", "version": "5.10.158-2", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "lsb-base, libc6 (>= 2.28)", "applications": [ { "path": "/usr/sbin/hv_vss_daemon", "sha256": "8d3b76f018feaadda3fea8d9ecfbb9365dc2c6ab40d7e7798f2ffa000096d50d", "sha1": "9f6ae8a82afc2f38aa58b47f0eb777815d31c601", "md5": "b83f202da7d3bad1b43e177abda848b8", "name": "hv_vss_daemon", "size": 13952, "description": null, "package": 4982855, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-16T10:14:24+00:00", "updated_at": "2022-12-16T10:14:24+00:00", "deleted_at": null }, { "path": "/usr/sbin/hv_kvp_daemon", "sha256": "867b041eb96b71142dd785a0e87533fc57c381d80cf9b138dad7bfa992e20a40", "sha1": "6d95db8e75f1c5dd633e6d3f6a76edacbbc13d05", "md5": "ac1754b0ba0b0262eca7662979f99bf6", "name": "hv_kvp_daemon", "size": 26352, "description": null, "package": 4982855, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-16T10:14:24+00:00", "updated_at": "2022-12-16T10:14:24+00:00", "deleted_at": null }, { "path": "/usr/sbin/hv_fcopy_daemon", "sha256": "59abf853d5b2ed40267787b9f30c68f5346e1993fc326751abb5cae407dccdd9", "sha1": "4b913d1a4191d7f78b6edc093e56018d80d50248", "md5": "e90b64a11a974d099fdcdfbf76557b26", "name": "hv_fcopy_daemon", "size": 13888, "description": null, "package": 4982855, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-16T10:14:24+00:00", "updated_at": "2022-12-16T10:14:24+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-2873", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "cef779d2af1b0c995938a6f120a140d34d032107b20ecc35c4a7ebec217789d9", "name": "hyperv-daemons", "version": "5.10.162-1", "filename": "hyperv-daemons_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:30+00:00", "updated_at": "2023-01-25T10:38:30+00:00" }, { "name": "CVE-2022-3545", "risk": 78, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "cef779d2af1b0c995938a6f120a140d34d032107b20ecc35c4a7ebec217789d9", "name": "hyperv-daemons", "version": "5.10.162-1", "filename": "hyperv-daemons_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:31+00:00", "updated_at": "2023-01-25T10:38:31+00:00" }, { "name": "CVE-2022-3623", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "cef779d2af1b0c995938a6f120a140d34d032107b20ecc35c4a7ebec217789d9", "name": "hyperv-daemons", "version": "5.10.162-1", "filename": "hyperv-daemons_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:32+00:00", "updated_at": "2023-01-25T10:38:32+00:00" }, { "name": "CVE-2022-4696", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "cef779d2af1b0c995938a6f120a140d34d032107b20ecc35c4a7ebec217789d9", "name": "hyperv-daemons", "version": "5.10.162-1", "filename": "hyperv-daemons_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:34+00:00", "updated_at": "2023-01-25T10:38:34+00:00" }, { "name": "CVE-2022-36280", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "cef779d2af1b0c995938a6f120a140d34d032107b20ecc35c4a7ebec217789d9", "name": "hyperv-daemons", "version": "5.10.162-1", "filename": "hyperv-daemons_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:35+00:00", "updated_at": "2023-01-25T10:38:35+00:00" }, { "name": "CVE-2022-41218", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "cef779d2af1b0c995938a6f120a140d34d032107b20ecc35c4a7ebec217789d9", "name": "hyperv-daemons", "version": "5.10.162-1", "filename": "hyperv-daemons_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:36+00:00", "updated_at": "2023-01-25T10:38:36+00:00" }, { "name": "CVE-2022-45934", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "cef779d2af1b0c995938a6f120a140d34d032107b20ecc35c4a7ebec217789d9", "name": "hyperv-daemons", "version": "5.10.162-1", "filename": "hyperv-daemons_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:38+00:00", "updated_at": "2023-01-25T10:38:38+00:00" }, { "name": "CVE-2022-47929", "risk": 6, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "cef779d2af1b0c995938a6f120a140d34d032107b20ecc35c4a7ebec217789d9", "name": "hyperv-daemons", "version": "5.10.162-1", "filename": "hyperv-daemons_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:39+00:00", "updated_at": "2023-01-25T10:38:39+00:00" }, { "name": "CVE-2023-0179", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "cef779d2af1b0c995938a6f120a140d34d032107b20ecc35c4a7ebec217789d9", "name": "hyperv-daemons", "version": "5.10.162-1", "filename": "hyperv-daemons_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:41+00:00", "updated_at": "2023-01-25T10:38:41+00:00" }, { "name": "CVE-2023-0266", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "cef779d2af1b0c995938a6f120a140d34d032107b20ecc35c4a7ebec217789d9", "name": "hyperv-daemons", "version": "5.10.162-1", "filename": "hyperv-daemons_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:42+00:00", "updated_at": "2023-01-25T10:38:42+00:00" }, { "name": "CVE-2023-0394", "risk": 6, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "cef779d2af1b0c995938a6f120a140d34d032107b20ecc35c4a7ebec217789d9", "name": "hyperv-daemons", "version": "5.10.162-1", "filename": "hyperv-daemons_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:43+00:00", "updated_at": "2023-01-25T10:38:43+00:00" }, { "name": "CVE-2023-23454", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "cef779d2af1b0c995938a6f120a140d34d032107b20ecc35c4a7ebec217789d9", "name": "hyperv-daemons", "version": "5.10.162-1", "filename": "hyperv-daemons_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:45+00:00", "updated_at": "2023-01-25T10:38:45+00:00" }, { "name": "CVE-2023-23455", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "cef779d2af1b0c995938a6f120a140d34d032107b20ecc35c4a7ebec217789d9", "name": "hyperv-daemons", "version": "5.10.162-1", "filename": "hyperv-daemons_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:46+00:00", "updated_at": "2023-01-25T10:38:46+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-12-14T05:32:51+00:00", "updated_at": "2022-12-16T10:14:24+00:00", "deleted_at": null }