Zercurity data services
  • Summary
  • Applications (3)
  • Packages (0)
  • Vulnerabilities (5)

hyperv-daemons

Hashes
Support daemons for Linux running on Hyper-V Suite of daemons for Linux guests running on Hyper-V, consisting of hv_fcopy_daemon, hv_kvp_daemon and hv_vss_daemon. hv_fcopy_daemon provides the file copy service, allowing the host to copy files into the guest. hv_kvp_daemon provides the key-value pair (KVP) service, allowing the host to get and set the IP networking configuration of the guest. (This requires helper scripts which are not currently included.) hv_vss_daemon provides the volume shadow copy service (VSS), allowing the host to freeze the guest filesystems while taking a snapshot.
  • SHA256: 4de42ad401a4ffed0f5e09a5de16bb4f039354f8cbd7c43856899989f502a3b3
  • SHA1: c635a4c9215158e954853a5b91b3a0eb97e51f29
  • MD5: e05418828c587cf5ef5569c27747d5e6
Information
  • Version: 4.19.146-1
  • Filename: hyperv-daemons_4.19.146-1_amd64.deb
  • Size: 561
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • URL: https://www.kernel.org/
  • Owner: Debian Kernel Team <debian-kernel@lists.debian.org>
  • Dependencies: lsb-base, libc6 (>= 2.4)

Applications

NameTypeArchSizeRisk
hv_kvp_daemon
/usr/sbin/hv_kvp_daemon
273520
hv_vss_daemon
/usr/sbin/hv_vss_daemon
148080
hv_fcopy_daemon
/usr/sbin/hv_fcopy_daemon
147120

Vulnerabilities

NameRiskSourceFixed
CVE-2020-1235188DSA
DSA-4774-1
hyperv-daemons
4.19.152-1
CVE-2020-1235265DSA
DSA-4774-1
hyperv-daemons
4.19.152-1
CVE-2020-2521160DSA
DSA-4774-1
hyperv-daemons
4.19.152-1
CVE-2020-2564375DSA
DSA-4774-1
hyperv-daemons
4.19.152-1
CVE-2020-2564575DSA
DSA-4774-1
hyperv-daemons
4.19.152-1

Raw Object

{
  "sha256": "4de42ad401a4ffed0f5e09a5de16bb4f039354f8cbd7c43856899989f502a3b3",
  "sha1": "c635a4c9215158e954853a5b91b3a0eb97e51f29",
  "md5": "e05418828c587cf5ef5569c27747d5e6",
  "type": "DEB",
  "arch": "AMD64",
  "name": "hyperv-daemons",
  "filename": "hyperv-daemons_4.19.146-1_amd64.deb",
  "size": 561,
  "description": "Support daemons for Linux running on Hyper-V\nSuite of daemons for Linux guests running on Hyper-V, consisting of\nhv_fcopy_daemon, hv_kvp_daemon and hv_vss_daemon.\n\nhv_fcopy_daemon provides the file copy service, allowing the host to copy\nfiles into the guest.\n\nhv_kvp_daemon provides the key-value pair (KVP) service, allowing the host\nto get and set the IP networking configuration of the guest.  (This\nrequires helper scripts which are not currently included.)\n\nhv_vss_daemon provides the volume shadow copy service (VSS), allowing the\nhost to freeze the guest filesystems while taking a snapshot.",
  "url": "https://www.kernel.org/",
  "version": "4.19.146-1",
  "source": "linux",
  "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>",
  "dependencies": "lsb-base, libc6 (>= 2.4)",
  "applications": [
    {
      "path": "/usr/sbin/hv_kvp_daemon",
      "sha256": "17f5341ed8ee9c9504b01febbf84434384fff460fcbd5f1cd2f0fccf11567bcc",
      "sha1": "1438c3e3b2a6a386d22d6b50d5915900c8b2cad3",
      "md5": "666175262dea0b21300db77c408a6857",
      "name": "hv_kvp_daemon",
      "size": 27352,
      "description": null,
      "package": 1079197,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-09T02:48:04+00:00",
      "updated_at": "2021-03-09T02:48:04+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/sbin/hv_vss_daemon",
      "sha256": "cfccb75147e786dcffd38b39b66b244204947ad4087316f0c8643ffc165abc1f",
      "sha1": "9021086b98bbcc9c42bb34e0d0eff31f46ef0327",
      "md5": "6fc9f97b2a761a6f8c331bbe68184dbb",
      "name": "hv_vss_daemon",
      "size": 14808,
      "description": null,
      "package": 1079197,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-09T02:48:04+00:00",
      "updated_at": "2021-03-09T02:48:04+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/sbin/hv_fcopy_daemon",
      "sha256": "a240e781f839821374056ffc00fc77d2a7041ed0e6083323e121d31ad7bb2414",
      "sha1": "da978d83498b559d797dec1883bb275b55565c5d",
      "md5": "838c4641cebd2d557ac7871ef9ad907a",
      "name": "hv_fcopy_daemon",
      "size": 14712,
      "description": null,
      "package": 1079197,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-09T02:48:04+00:00",
      "updated_at": "2021-03-09T02:48:04+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2020-12351",
      "risk": 88,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": {
        "sha256": "05a4bc1acbe2fa4a9f9f4c5dc467af477bdc4e586ff3688ae54bf03f3a6479a4",
        "name": "hyperv-daemons",
        "version": "4.19.152-1",
        "filename": "hyperv-daemons_4.19.152-1_amd64.deb"
      },
      "created_at": "2021-03-09T07:31:39+00:00",
      "updated_at": "2021-03-09T07:31:39+00:00"
    },
    {
      "name": "CVE-2020-12352",
      "risk": 65,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": {
        "sha256": "05a4bc1acbe2fa4a9f9f4c5dc467af477bdc4e586ff3688ae54bf03f3a6479a4",
        "name": "hyperv-daemons",
        "version": "4.19.152-1",
        "filename": "hyperv-daemons_4.19.152-1_amd64.deb"
      },
      "created_at": "2021-03-09T07:31:50+00:00",
      "updated_at": "2021-03-09T07:31:50+00:00"
    },
    {
      "name": "CVE-2020-25211",
      "risk": 60,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": {
        "sha256": "05a4bc1acbe2fa4a9f9f4c5dc467af477bdc4e586ff3688ae54bf03f3a6479a4",
        "name": "hyperv-daemons",
        "version": "4.19.152-1",
        "filename": "hyperv-daemons_4.19.152-1_amd64.deb"
      },
      "created_at": "2021-03-09T07:32:00+00:00",
      "updated_at": "2021-03-09T07:32:00+00:00"
    },
    {
      "name": "CVE-2020-25643",
      "risk": 75,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": {
        "sha256": "05a4bc1acbe2fa4a9f9f4c5dc467af477bdc4e586ff3688ae54bf03f3a6479a4",
        "name": "hyperv-daemons",
        "version": "4.19.152-1",
        "filename": "hyperv-daemons_4.19.152-1_amd64.deb"
      },
      "created_at": "2021-03-09T07:32:08+00:00",
      "updated_at": "2021-03-09T07:32:08+00:00"
    },
    {
      "name": "CVE-2020-25645",
      "risk": 75,
      "source": "DSA",
      "sid": "DSA-4774-1",
      "fixed": {
        "sha256": "05a4bc1acbe2fa4a9f9f4c5dc467af477bdc4e586ff3688ae54bf03f3a6479a4",
        "name": "hyperv-daemons",
        "version": "4.19.152-1",
        "filename": "hyperv-daemons_4.19.152-1_amd64.deb"
      },
      "created_at": "2021-03-09T07:32:18+00:00",
      "updated_at": "2021-03-09T07:32:18+00:00"
    }
  ],
  "risk": 88,
  "vulnerable": 88,
  "outdated": 0,
  "malicious": 0,
  "created_at": "2020-09-18T21:23:12+00:00",
  "updated_at": "2021-03-09T02:48:04+00:00",
  "deleted_at": null
}