Zercurity data services
  • Summary
  • Applications (3)
  • Packages (0)
  • Vulnerabilities (14)

hyperv-daemons

Hashes
Support daemons for Linux running on Hyper-V Suite of daemons for Linux guests running on Hyper-V, consisting of hv_fcopy_daemon, hv_kvp_daemon and hv_vss_daemon. hv_fcopy_daemon provides the file copy service, allowing the host to copy files into the guest. hv_kvp_daemon provides the key-value pair (KVP) service, allowing the host to get and set the IP networking configuration of the guest. (This requires helper scripts which are not currently included.) hv_vss_daemon provides the volume shadow copy service (VSS), allowing the host to freeze the guest filesystems while taking a snapshot.
  • SHA256: 53469537a6c499505e8723940c32d65e3e01e1d16d5e9b07d191ca097546744d
  • SHA1: f9c6b0eede85435f8b317d2ebf844282903ed360
  • MD5: 98d2ec42b91c1ed5003e1603c4bfb465
Information
  • Version: 5.10.120-1~bpo10+1
  • Filename: hyperv-daemons_5.10.120-1~bpo10+1_i386.deb
  • Size: 562
  • Type: DEB
  • Source: linux
  • Architecture: I386
  • URL: https://www.kernel.org/
  • Owner: Debian Kernel Team <debian-kernel@lists.debian.org>
  • Dependencies: lsb-base, libc6 (>= 2.28)

Applications

NameTypeArchSizeRisk
hv_fcopy_daemon
/usr/sbin/hv_fcopy_daemon
138880
hv_kvp_daemon
/usr/sbin/hv_kvp_daemon
263520
hv_vss_daemon
/usr/sbin/hv_vss_daemon
139520

Vulnerabilities

NameRiskSourceFixed
CVE-2022-04940DSA
DSA-5161-1
CVE-2022-085455DSA
DSA-5161-1
CVE-2022-101291DSA
DSA-5161-1
CVE-2022-172970DSA
DSA-5161-1
CVE-2022-17860DSA
DSA-5161-1
CVE-2022-17890DSA
DSA-5161-1
CVE-2022-18520DSA
DSA-5161-1
CVE-2022-322500DSA
DSA-5161-1
CVE-2022-19720DSA
DSA-5161-1
CVE-2022-197441DSA
DSA-5161-1
CVE-2022-197555DSA
DSA-5161-1
CVE-2022-2149967DSA
DSA-5161-1
CVE-2022-2889378DSA
DSA-5161-1
CVE-2022-20780DSA
DSA-5161-1

Raw Object

{
  "sha256": "53469537a6c499505e8723940c32d65e3e01e1d16d5e9b07d191ca097546744d",
  "sha1": "f9c6b0eede85435f8b317d2ebf844282903ed360",
  "md5": "98d2ec42b91c1ed5003e1603c4bfb465",
  "type": "DEB",
  "arch": "I386",
  "name": "hyperv-daemons",
  "filename": "hyperv-daemons_5.10.120-1~bpo10+1_i386.deb",
  "size": 562,
  "description": "Support daemons for Linux running on Hyper-V\nSuite of daemons for Linux guests running on Hyper-V, consisting of\nhv_fcopy_daemon, hv_kvp_daemon and hv_vss_daemon.\n\nhv_fcopy_daemon provides the file copy service, allowing the host to copy\nfiles into the guest.\n\nhv_kvp_daemon provides the key-value pair (KVP) service, allowing the host\nto get and set the IP networking configuration of the guest.  (This\nrequires helper scripts which are not currently included.)\n\nhv_vss_daemon provides the volume shadow copy service (VSS), allowing the\nhost to freeze the guest filesystems while taking a snapshot.",
  "url": "https://www.kernel.org/",
  "version": "5.10.120-1~bpo10+1",
  "source": "linux",
  "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>",
  "dependencies": "lsb-base, libc6 (>= 2.28)",
  "applications": [
    {
      "path": "/usr/sbin/hv_fcopy_daemon",
      "sha256": "9ced1d42bde714c7dc7d9c8e24c1e2bcb18b07ca1b2b95f5f5e14baaebc78bec",
      "sha1": "3fbf5fe1e48ca003b5c57974e215bd0fa2099439",
      "md5": "1165b97af93cbcbf2bd32decbec361cb",
      "name": "hv_fcopy_daemon",
      "size": 13888,
      "description": null,
      "package": 3794620,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-21T02:19:21+00:00",
      "updated_at": "2022-06-21T02:19:21+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/sbin/hv_kvp_daemon",
      "sha256": "00f4018baf1bb241f1a55a89da88e8f9f6898e15084ca9d5307cf5dff3848b45",
      "sha1": "62557e44a617d98dede2ccb14a89ab15676c83e8",
      "md5": "401ac29c83c0385fdc9ebb2774f63059",
      "name": "hv_kvp_daemon",
      "size": 26352,
      "description": null,
      "package": 3794620,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-21T02:19:21+00:00",
      "updated_at": "2022-06-21T02:19:21+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/sbin/hv_vss_daemon",
      "sha256": "bab58e952ac35c398f86500aa5039a275427e46bbf8bc430cba2abf9883d575d",
      "sha1": "ebe58d517af96fc244e544d546ae22e867822ce3",
      "md5": "7874a56a81ec4e6b87cac6969a4545db",
      "name": "hv_vss_daemon",
      "size": 13952,
      "description": null,
      "package": 3794620,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-21T02:19:21+00:00",
      "updated_at": "2022-06-21T02:19:21+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2022-0494",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:43:53+00:00",
      "updated_at": "2022-07-27T20:43:53+00:00"
    },
    {
      "name": "CVE-2022-0854",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:44:25+00:00",
      "updated_at": "2022-07-27T20:44:25+00:00"
    },
    {
      "name": "CVE-2022-1012",
      "risk": 91,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:44:57+00:00",
      "updated_at": "2022-07-27T20:44:57+00:00"
    },
    {
      "name": "CVE-2022-1729",
      "risk": 70,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:45:28+00:00",
      "updated_at": "2022-07-27T20:45:28+00:00"
    },
    {
      "name": "CVE-2022-1786",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:46:02+00:00",
      "updated_at": "2022-07-27T20:46:02+00:00"
    },
    {
      "name": "CVE-2022-1789",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:46:34+00:00",
      "updated_at": "2022-07-27T20:46:34+00:00"
    },
    {
      "name": "CVE-2022-1852",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:47:08+00:00",
      "updated_at": "2022-07-27T20:47:08+00:00"
    },
    {
      "name": "CVE-2022-32250",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:47:42+00:00",
      "updated_at": "2022-07-27T20:47:42+00:00"
    },
    {
      "name": "CVE-2022-1972",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:48:21+00:00",
      "updated_at": "2022-07-27T20:48:21+00:00"
    },
    {
      "name": "CVE-2022-1974",
      "risk": 41,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:48:54+00:00",
      "updated_at": "2022-07-27T20:48:54+00:00"
    },
    {
      "name": "CVE-2022-1975",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:49:31+00:00",
      "updated_at": "2022-07-27T20:49:31+00:00"
    },
    {
      "name": "CVE-2022-21499",
      "risk": 67,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:50:05+00:00",
      "updated_at": "2022-07-27T20:50:05+00:00"
    },
    {
      "name": "CVE-2022-28893",
      "risk": 78,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:50:36+00:00",
      "updated_at": "2022-07-27T20:50:36+00:00"
    },
    {
      "name": "CVE-2022-2078",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-09-18T15:50:51+00:00",
      "updated_at": "2022-09-18T15:50:51+00:00"
    }
  ],
  "risk": 91,
  "vulnerable": 91,
  "outdated": 91,
  "malicious": 0,
  "created_at": "2022-06-20T18:15:52+00:00",
  "updated_at": "2022-06-21T01:19:21+00:00",
  "deleted_at": null
}