Zercurity data services
  • Summary
  • Applications (3)
  • Packages (0)
  • Vulnerabilities (13)

hyperv-daemons

Hashes
Support daemons for Linux running on Hyper-V Suite of daemons for Linux guests running on Hyper-V, consisting of hv_fcopy_daemon, hv_kvp_daemon and hv_vss_daemon. hv_fcopy_daemon provides the file copy service, allowing the host to copy files into the guest. hv_kvp_daemon provides the key-value pair (KVP) service, allowing the host to get and set the IP networking configuration of the guest. (This requires helper scripts which are not currently included.) hv_vss_daemon provides the volume shadow copy service (VSS), allowing the host to freeze the guest filesystems while taking a snapshot.
  • SHA256: 406c7dda2b3464102c278df5cddf90fbd66f0aae47eb1eaaf832e52173f48a7a
  • SHA1: fb50c7eed444a109e6847c8cd0cf9f92d21e9fd1
  • MD5: e12a686293cb0e34e9424f26ea77f4d2
Information
  • Version: 5.10.158-2
  • Filename: hyperv-daemons_5.10.158-2_amd64.deb
  • Size: 633
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • URL: https://www.kernel.org/
  • Owner: Debian Kernel Team <debian-kernel@lists.debian.org>
  • Dependencies: lsb-base, libc6 (>= 2.4)

Applications

NameTypeArchSizeRisk
hv_fcopy_daemon
/usr/sbin/hv_fcopy_daemon
147120
hv_kvp_daemon
/usr/sbin/hv_kvp_daemon
273520
hv_vss_daemon
/usr/sbin/hv_vss_daemon
148080

Vulnerabilities

NameRiskSourceFixed
CVE-2022-287355DSA
DSA-5324-1
bpftool
5.10.162-1
CVE-2022-354578DSA
DSA-5324-1
bpftool
5.10.162-1
CVE-2022-36238DSA
DSA-5324-1
bpftool
5.10.162-1
CVE-2022-46960DSA
DSA-5324-1
bpftool
5.10.162-1
CVE-2022-3628055DSA
DSA-5324-1
bpftool
5.10.162-1
CVE-2022-4121855DSA
DSA-5324-1
bpftool
5.10.162-1
CVE-2022-459348DSA
DSA-5324-1
bpftool
5.10.162-1
CVE-2022-479296DSA
DSA-5324-1
bpftool
5.10.162-1
CVE-2023-01798DSA
DSA-5324-1
bpftool
5.10.162-1
CVE-2023-02668DSA
DSA-5324-1
bpftool
5.10.162-1
CVE-2023-03946DSA
DSA-5324-1
bpftool
5.10.162-1
CVE-2023-234540DSA
DSA-5324-1
bpftool
5.10.162-1
CVE-2023-234550DSA
DSA-5324-1
bpftool
5.10.162-1

Raw Object

{
  "sha256": "406c7dda2b3464102c278df5cddf90fbd66f0aae47eb1eaaf832e52173f48a7a",
  "sha1": "fb50c7eed444a109e6847c8cd0cf9f92d21e9fd1",
  "md5": "e12a686293cb0e34e9424f26ea77f4d2",
  "type": "DEB",
  "arch": "AMD64",
  "name": "hyperv-daemons",
  "filename": "hyperv-daemons_5.10.158-2_amd64.deb",
  "size": 633,
  "description": "Support daemons for Linux running on Hyper-V\nSuite of daemons for Linux guests running on Hyper-V, consisting of\nhv_fcopy_daemon, hv_kvp_daemon and hv_vss_daemon.\n\nhv_fcopy_daemon provides the file copy service, allowing the host to copy\nfiles into the guest.\n\nhv_kvp_daemon provides the key-value pair (KVP) service, allowing the host\nto get and set the IP networking configuration of the guest.  (This\nrequires helper scripts which are not currently included.)\n\nhv_vss_daemon provides the volume shadow copy service (VSS), allowing the\nhost to freeze the guest filesystems while taking a snapshot.",
  "url": "https://www.kernel.org/",
  "version": "5.10.158-2",
  "source": "linux",
  "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>",
  "dependencies": "lsb-base, libc6 (>= 2.4)",
  "applications": [
    {
      "path": "/usr/sbin/hv_fcopy_daemon",
      "sha256": "1aea9918b302840057697948f7d4459d6d25028317bc8cd0f3e9d7bfac037989",
      "sha1": "8bd6e4370698915c958b2ce9ad1cc52bad859673",
      "md5": "8822a2edd5bb45e00f39005f9a2d26bb",
      "name": "hv_fcopy_daemon",
      "size": 14712,
      "description": null,
      "package": 4982854,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-12-16T10:14:23+00:00",
      "updated_at": "2022-12-16T10:14:23+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/sbin/hv_kvp_daemon",
      "sha256": "6c635701205441c42a04be986d3d9e1cad76f16c1fd2c2dbb652c2e0329d5ed1",
      "sha1": "f4f41029e387e64a5b1b47a9b54946de86dbe8f4",
      "md5": "40729e4c72afe2cce4e7438cfa7d0501",
      "name": "hv_kvp_daemon",
      "size": 27352,
      "description": null,
      "package": 4982854,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-12-16T10:14:23+00:00",
      "updated_at": "2022-12-16T10:14:23+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/sbin/hv_vss_daemon",
      "sha256": "c7c5ccdb5b5104f5242a24a794a0883742f1a78b9ed0f648de0dd28b74f7bf3d",
      "sha1": "c7b9c230c437e137741c9e93c16eddb166c68c27",
      "md5": "0e2bdc9bdd33e1c81fec38cbbb18740e",
      "name": "hv_vss_daemon",
      "size": 14808,
      "description": null,
      "package": 4982854,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-12-16T10:14:23+00:00",
      "updated_at": "2022-12-16T10:14:23+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2022-2873",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-5324-1",
      "fixed": {
        "sha256": "b8294823f6a9ad67573f3c098905f47918c38e8ba76bdaaecb3dcdb605313743",
        "name": "bpftool",
        "version": "5.10.162-1",
        "filename": "bpftool_5.10.162-1_i386.deb"
      },
      "created_at": "2023-01-25T10:38:30+00:00",
      "updated_at": "2023-01-25T10:38:30+00:00"
    },
    {
      "name": "CVE-2022-3545",
      "risk": 78,
      "source": "DSA",
      "sid": "DSA-5324-1",
      "fixed": {
        "sha256": "b8294823f6a9ad67573f3c098905f47918c38e8ba76bdaaecb3dcdb605313743",
        "name": "bpftool",
        "version": "5.10.162-1",
        "filename": "bpftool_5.10.162-1_i386.deb"
      },
      "created_at": "2023-01-25T10:38:31+00:00",
      "updated_at": "2023-01-25T10:38:31+00:00"
    },
    {
      "name": "CVE-2022-3623",
      "risk": 8,
      "source": "DSA",
      "sid": "DSA-5324-1",
      "fixed": {
        "sha256": "b8294823f6a9ad67573f3c098905f47918c38e8ba76bdaaecb3dcdb605313743",
        "name": "bpftool",
        "version": "5.10.162-1",
        "filename": "bpftool_5.10.162-1_i386.deb"
      },
      "created_at": "2023-01-25T10:38:32+00:00",
      "updated_at": "2023-01-25T10:38:32+00:00"
    },
    {
      "name": "CVE-2022-4696",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5324-1",
      "fixed": {
        "sha256": "b8294823f6a9ad67573f3c098905f47918c38e8ba76bdaaecb3dcdb605313743",
        "name": "bpftool",
        "version": "5.10.162-1",
        "filename": "bpftool_5.10.162-1_i386.deb"
      },
      "created_at": "2023-01-25T10:38:34+00:00",
      "updated_at": "2023-01-25T10:38:34+00:00"
    },
    {
      "name": "CVE-2022-36280",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-5324-1",
      "fixed": {
        "sha256": "b8294823f6a9ad67573f3c098905f47918c38e8ba76bdaaecb3dcdb605313743",
        "name": "bpftool",
        "version": "5.10.162-1",
        "filename": "bpftool_5.10.162-1_i386.deb"
      },
      "created_at": "2023-01-25T10:38:35+00:00",
      "updated_at": "2023-01-25T10:38:35+00:00"
    },
    {
      "name": "CVE-2022-41218",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-5324-1",
      "fixed": {
        "sha256": "b8294823f6a9ad67573f3c098905f47918c38e8ba76bdaaecb3dcdb605313743",
        "name": "bpftool",
        "version": "5.10.162-1",
        "filename": "bpftool_5.10.162-1_i386.deb"
      },
      "created_at": "2023-01-25T10:38:36+00:00",
      "updated_at": "2023-01-25T10:38:36+00:00"
    },
    {
      "name": "CVE-2022-45934",
      "risk": 8,
      "source": "DSA",
      "sid": "DSA-5324-1",
      "fixed": {
        "sha256": "b8294823f6a9ad67573f3c098905f47918c38e8ba76bdaaecb3dcdb605313743",
        "name": "bpftool",
        "version": "5.10.162-1",
        "filename": "bpftool_5.10.162-1_i386.deb"
      },
      "created_at": "2023-01-25T10:38:38+00:00",
      "updated_at": "2023-01-25T10:38:38+00:00"
    },
    {
      "name": "CVE-2022-47929",
      "risk": 6,
      "source": "DSA",
      "sid": "DSA-5324-1",
      "fixed": {
        "sha256": "b8294823f6a9ad67573f3c098905f47918c38e8ba76bdaaecb3dcdb605313743",
        "name": "bpftool",
        "version": "5.10.162-1",
        "filename": "bpftool_5.10.162-1_i386.deb"
      },
      "created_at": "2023-01-25T10:38:39+00:00",
      "updated_at": "2023-01-25T10:38:39+00:00"
    },
    {
      "name": "CVE-2023-0179",
      "risk": 8,
      "source": "DSA",
      "sid": "DSA-5324-1",
      "fixed": {
        "sha256": "b8294823f6a9ad67573f3c098905f47918c38e8ba76bdaaecb3dcdb605313743",
        "name": "bpftool",
        "version": "5.10.162-1",
        "filename": "bpftool_5.10.162-1_i386.deb"
      },
      "created_at": "2023-01-25T10:38:41+00:00",
      "updated_at": "2023-01-25T10:38:41+00:00"
    },
    {
      "name": "CVE-2023-0266",
      "risk": 8,
      "source": "DSA",
      "sid": "DSA-5324-1",
      "fixed": {
        "sha256": "b8294823f6a9ad67573f3c098905f47918c38e8ba76bdaaecb3dcdb605313743",
        "name": "bpftool",
        "version": "5.10.162-1",
        "filename": "bpftool_5.10.162-1_i386.deb"
      },
      "created_at": "2023-01-25T10:38:42+00:00",
      "updated_at": "2023-01-25T10:38:42+00:00"
    },
    {
      "name": "CVE-2023-0394",
      "risk": 6,
      "source": "DSA",
      "sid": "DSA-5324-1",
      "fixed": {
        "sha256": "b8294823f6a9ad67573f3c098905f47918c38e8ba76bdaaecb3dcdb605313743",
        "name": "bpftool",
        "version": "5.10.162-1",
        "filename": "bpftool_5.10.162-1_i386.deb"
      },
      "created_at": "2023-01-25T10:38:43+00:00",
      "updated_at": "2023-01-25T10:38:43+00:00"
    },
    {
      "name": "CVE-2023-23454",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5324-1",
      "fixed": {
        "sha256": "b8294823f6a9ad67573f3c098905f47918c38e8ba76bdaaecb3dcdb605313743",
        "name": "bpftool",
        "version": "5.10.162-1",
        "filename": "bpftool_5.10.162-1_i386.deb"
      },
      "created_at": "2023-01-25T10:38:45+00:00",
      "updated_at": "2023-01-25T10:38:45+00:00"
    },
    {
      "name": "CVE-2023-23455",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5324-1",
      "fixed": {
        "sha256": "b8294823f6a9ad67573f3c098905f47918c38e8ba76bdaaecb3dcdb605313743",
        "name": "bpftool",
        "version": "5.10.162-1",
        "filename": "bpftool_5.10.162-1_i386.deb"
      },
      "created_at": "2023-01-25T10:38:46+00:00",
      "updated_at": "2023-01-25T10:38:46+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 78,
  "malicious": 0,
  "created_at": "2022-12-14T06:13:44+00:00",
  "updated_at": "2022-12-16T10:14:23+00:00",
  "deleted_at": null
}