406c7dda2b3464102c278df5cddf90fbd66f0aae47eb1eaaf832e52173f48a7a
fb50c7eed444a109e6847c8cd0cf9f92d21e9fd1
e12a686293cb0e34e9424f26ea77f4d2
5.10.158-2
hyperv-daemons_5.10.158-2_amd64.deb
633
DEB
linux
AMD64
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
lsb-base, libc6 (>= 2.4)
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
hv_fcopy_daemon /usr/sbin/hv_fcopy_daemon | 14712 | 0 | ||
hv_kvp_daemon /usr/sbin/hv_kvp_daemon | 27352 | 0 | ||
hv_vss_daemon /usr/sbin/hv_vss_daemon | 14808 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2022-2873 | 55 | DSA DSA-5324-1 | bpftool 5.10.162-1 |
CVE-2022-3545 | 78 | DSA DSA-5324-1 | bpftool 5.10.162-1 |
CVE-2022-3623 | 8 | DSA DSA-5324-1 | bpftool 5.10.162-1 |
CVE-2022-4696 | 0 | DSA DSA-5324-1 | bpftool 5.10.162-1 |
CVE-2022-36280 | 55 | DSA DSA-5324-1 | bpftool 5.10.162-1 |
CVE-2022-41218 | 55 | DSA DSA-5324-1 | bpftool 5.10.162-1 |
CVE-2022-45934 | 8 | DSA DSA-5324-1 | bpftool 5.10.162-1 |
CVE-2022-47929 | 6 | DSA DSA-5324-1 | bpftool 5.10.162-1 |
CVE-2023-0179 | 8 | DSA DSA-5324-1 | bpftool 5.10.162-1 |
CVE-2023-0266 | 8 | DSA DSA-5324-1 | bpftool 5.10.162-1 |
CVE-2023-0394 | 6 | DSA DSA-5324-1 | bpftool 5.10.162-1 |
CVE-2023-23454 | 0 | DSA DSA-5324-1 | bpftool 5.10.162-1 |
CVE-2023-23455 | 0 | DSA DSA-5324-1 | bpftool 5.10.162-1 |
{ "sha256": "406c7dda2b3464102c278df5cddf90fbd66f0aae47eb1eaaf832e52173f48a7a", "sha1": "fb50c7eed444a109e6847c8cd0cf9f92d21e9fd1", "md5": "e12a686293cb0e34e9424f26ea77f4d2", "type": "DEB", "arch": "AMD64", "name": "hyperv-daemons", "filename": "hyperv-daemons_5.10.158-2_amd64.deb", "size": 633, "description": "Support daemons for Linux running on Hyper-V\nSuite of daemons for Linux guests running on Hyper-V, consisting of\nhv_fcopy_daemon, hv_kvp_daemon and hv_vss_daemon.\n\nhv_fcopy_daemon provides the file copy service, allowing the host to copy\nfiles into the guest.\n\nhv_kvp_daemon provides the key-value pair (KVP) service, allowing the host\nto get and set the IP networking configuration of the guest. (This\nrequires helper scripts which are not currently included.)\n\nhv_vss_daemon provides the volume shadow copy service (VSS), allowing the\nhost to freeze the guest filesystems while taking a snapshot.", "url": "https://www.kernel.org/", "version": "5.10.158-2", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "lsb-base, libc6 (>= 2.4)", "applications": [ { "path": "/usr/sbin/hv_fcopy_daemon", "sha256": "1aea9918b302840057697948f7d4459d6d25028317bc8cd0f3e9d7bfac037989", "sha1": "8bd6e4370698915c958b2ce9ad1cc52bad859673", "md5": "8822a2edd5bb45e00f39005f9a2d26bb", "name": "hv_fcopy_daemon", "size": 14712, "description": null, "package": 4982854, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-16T10:14:23+00:00", "updated_at": "2022-12-16T10:14:23+00:00", "deleted_at": null }, { "path": "/usr/sbin/hv_kvp_daemon", "sha256": "6c635701205441c42a04be986d3d9e1cad76f16c1fd2c2dbb652c2e0329d5ed1", "sha1": "f4f41029e387e64a5b1b47a9b54946de86dbe8f4", "md5": "40729e4c72afe2cce4e7438cfa7d0501", "name": "hv_kvp_daemon", "size": 27352, "description": null, "package": 4982854, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-16T10:14:23+00:00", "updated_at": "2022-12-16T10:14:23+00:00", "deleted_at": null }, { "path": "/usr/sbin/hv_vss_daemon", "sha256": "c7c5ccdb5b5104f5242a24a794a0883742f1a78b9ed0f648de0dd28b74f7bf3d", "sha1": "c7b9c230c437e137741c9e93c16eddb166c68c27", "md5": "0e2bdc9bdd33e1c81fec38cbbb18740e", "name": "hv_vss_daemon", "size": 14808, "description": null, "package": 4982854, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-12-16T10:14:23+00:00", "updated_at": "2022-12-16T10:14:23+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2022-2873", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "b8294823f6a9ad67573f3c098905f47918c38e8ba76bdaaecb3dcdb605313743", "name": "bpftool", "version": "5.10.162-1", "filename": "bpftool_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:30+00:00", "updated_at": "2023-01-25T10:38:30+00:00" }, { "name": "CVE-2022-3545", "risk": 78, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "b8294823f6a9ad67573f3c098905f47918c38e8ba76bdaaecb3dcdb605313743", "name": "bpftool", "version": "5.10.162-1", "filename": "bpftool_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:31+00:00", "updated_at": "2023-01-25T10:38:31+00:00" }, { "name": "CVE-2022-3623", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "b8294823f6a9ad67573f3c098905f47918c38e8ba76bdaaecb3dcdb605313743", "name": "bpftool", "version": "5.10.162-1", "filename": "bpftool_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:32+00:00", "updated_at": "2023-01-25T10:38:32+00:00" }, { "name": "CVE-2022-4696", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "b8294823f6a9ad67573f3c098905f47918c38e8ba76bdaaecb3dcdb605313743", "name": "bpftool", "version": "5.10.162-1", "filename": "bpftool_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:34+00:00", "updated_at": "2023-01-25T10:38:34+00:00" }, { "name": "CVE-2022-36280", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "b8294823f6a9ad67573f3c098905f47918c38e8ba76bdaaecb3dcdb605313743", "name": "bpftool", "version": "5.10.162-1", "filename": "bpftool_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:35+00:00", "updated_at": "2023-01-25T10:38:35+00:00" }, { "name": "CVE-2022-41218", "risk": 55, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "b8294823f6a9ad67573f3c098905f47918c38e8ba76bdaaecb3dcdb605313743", "name": "bpftool", "version": "5.10.162-1", "filename": "bpftool_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:36+00:00", "updated_at": "2023-01-25T10:38:36+00:00" }, { "name": "CVE-2022-45934", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "b8294823f6a9ad67573f3c098905f47918c38e8ba76bdaaecb3dcdb605313743", "name": "bpftool", "version": "5.10.162-1", "filename": "bpftool_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:38+00:00", "updated_at": "2023-01-25T10:38:38+00:00" }, { "name": "CVE-2022-47929", "risk": 6, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "b8294823f6a9ad67573f3c098905f47918c38e8ba76bdaaecb3dcdb605313743", "name": "bpftool", "version": "5.10.162-1", "filename": "bpftool_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:39+00:00", "updated_at": "2023-01-25T10:38:39+00:00" }, { "name": "CVE-2023-0179", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "b8294823f6a9ad67573f3c098905f47918c38e8ba76bdaaecb3dcdb605313743", "name": "bpftool", "version": "5.10.162-1", "filename": "bpftool_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:41+00:00", "updated_at": "2023-01-25T10:38:41+00:00" }, { "name": "CVE-2023-0266", "risk": 8, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "b8294823f6a9ad67573f3c098905f47918c38e8ba76bdaaecb3dcdb605313743", "name": "bpftool", "version": "5.10.162-1", "filename": "bpftool_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:42+00:00", "updated_at": "2023-01-25T10:38:42+00:00" }, { "name": "CVE-2023-0394", "risk": 6, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "b8294823f6a9ad67573f3c098905f47918c38e8ba76bdaaecb3dcdb605313743", "name": "bpftool", "version": "5.10.162-1", "filename": "bpftool_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:43+00:00", "updated_at": "2023-01-25T10:38:43+00:00" }, { "name": "CVE-2023-23454", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "b8294823f6a9ad67573f3c098905f47918c38e8ba76bdaaecb3dcdb605313743", "name": "bpftool", "version": "5.10.162-1", "filename": "bpftool_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:45+00:00", "updated_at": "2023-01-25T10:38:45+00:00" }, { "name": "CVE-2023-23455", "risk": 0, "source": "DSA", "sid": "DSA-5324-1", "fixed": { "sha256": "b8294823f6a9ad67573f3c098905f47918c38e8ba76bdaaecb3dcdb605313743", "name": "bpftool", "version": "5.10.162-1", "filename": "bpftool_5.10.162-1_i386.deb" }, "created_at": "2023-01-25T10:38:46+00:00", "updated_at": "2023-01-25T10:38:46+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-12-14T06:13:44+00:00", "updated_at": "2022-12-16T10:14:23+00:00", "deleted_at": null }