Zercurity data services
  • Summary
  • Applications (4)
  • Packages (0)
  • Vulnerabilities (2)

hyperv-daemons

Hashes
Support daemons for Linux running on Hyper-V Suite of daemons for Linux guests running on Hyper-V, consisting of hv_fcopy_daemon, hv_kvp_daemon and hv_vss_daemon. hv_fcopy_daemon provides the file copy service, allowing the host to copy files into the guest. hv_kvp_daemon provides the key-value pair (KVP) service, allowing the host to get and set the IP networking configuration of the guest. (This requires helper scripts which are not currently included.) hv_vss_daemon provides the volume shadow copy service (VSS), allowing the host to freeze the guest filesystems while taking a snapshot.
  • SHA256: 62a5345199146142c2eff3fe9550a28074bc687189c53fb9236b9bfbf033bb60
  • SHA1: 7cf1eb13ae42aa3fd4bedcacf4f554a2e93b5214
  • MD5: f2c5a2726785e97f2862b3af41b8a6d0
Information
  • Version: 4.9.168-1+deb9u3
  • Filename: hyperv-daemons_4.9.168-1+deb9u3_amd64.deb
  • Size: 705
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • URL: https://www.kernel.org/
  • Owner: Debian Kernel Team <debian-kernel@lists.debian.org>
  • Dependencies: lsb-base, libc6 (>= 2.4), init-system-helpers (>= 1.18~)

Applications

NameTypeArchSizeRisk
check-hyperv
/lib/hyperv-daemons/check-hyperv
63200
hv_fcopy_daemon
/usr/sbin/hv_fcopy_daemon
106800
hv_kvp_daemon
/usr/sbin/hv_kvp_daemon
233200
hv_vss_daemon
/usr/sbin/hv_vss_daemon
107120

Vulnerabilities

NameRiskSourceFixed
CVE-2019-1327278DSA
DSA-4484-1
CVE-2019-1327278DSA
DSA-4484-1
hyperv-daemons
4.9.168-1+deb9u4

Raw Object

{
  "sha256": "62a5345199146142c2eff3fe9550a28074bc687189c53fb9236b9bfbf033bb60",
  "sha1": "7cf1eb13ae42aa3fd4bedcacf4f554a2e93b5214",
  "md5": "f2c5a2726785e97f2862b3af41b8a6d0",
  "type": "DEB",
  "arch": "AMD64",
  "name": "hyperv-daemons",
  "filename": "hyperv-daemons_4.9.168-1+deb9u3_amd64.deb",
  "size": 705,
  "description": "Support daemons for Linux running on Hyper-V\nSuite of daemons for Linux guests running on Hyper-V, consisting of\nhv_fcopy_daemon, hv_kvp_daemon and hv_vss_daemon.\n\nhv_fcopy_daemon provides the file copy service, allowing the host to copy\nfiles into the guest.\n\nhv_kvp_daemon provides the key-value pair (KVP) service, allowing the host\nto get and set the IP networking configuration of the guest.  (This\nrequires helper scripts which are not currently included.)\n\nhv_vss_daemon provides the volume shadow copy service (VSS), allowing the\nhost to freeze the guest filesystems while taking a snapshot.",
  "url": "https://www.kernel.org/",
  "version": "4.9.168-1+deb9u3",
  "source": "linux",
  "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>",
  "dependencies": "lsb-base, libc6 (>= 2.4), init-system-helpers (>= 1.18~)",
  "applications": [
    {
      "path": "/lib/hyperv-daemons/check-hyperv",
      "sha256": "de1be523e30d5c3dbc44991508f5a0353aae155e207a73f199053d8ab0745fa0",
      "sha1": "470b8d7c269e6a6eee7b6351e56c5d52da05e17a",
      "md5": "de25274ba465109fa7e60e170d564c10",
      "name": "check-hyperv",
      "size": 6320,
      "description": null,
      "package": 1006890,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-07T11:16:54+00:00",
      "updated_at": "2021-03-07T11:16:54+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/sbin/hv_fcopy_daemon",
      "sha256": "9d954538217c034c1eed2f7dceac360251060327b7fbc25aa5489bbd145828c5",
      "sha1": "6088ca249a629febf152f0bfc5dc7c13835de9bd",
      "md5": "d9df9484fb633dea8a6ef631862e9549",
      "name": "hv_fcopy_daemon",
      "size": 10680,
      "description": null,
      "package": 1006890,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-07T11:16:54+00:00",
      "updated_at": "2021-03-07T11:16:54+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/sbin/hv_kvp_daemon",
      "sha256": "f3ed077f4ce76bd273ab05e324248af6d7b78eda5b8c8249d7dcbeb603edf61b",
      "sha1": "cb079bafafa8a6afc5a4ce8a851ffab31c112c7c",
      "md5": "14f53101c172a33f8ffdd644c21b3d62",
      "name": "hv_kvp_daemon",
      "size": 23320,
      "description": null,
      "package": 1006890,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-07T11:16:54+00:00",
      "updated_at": "2021-03-07T11:16:54+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/sbin/hv_vss_daemon",
      "sha256": "d18575f3e64cc916771e7b8deb2514449e97129a85d29f3dbfd52cd433fb893d",
      "sha1": "f1c9ec9b2cde0a199fc7d77cb6c992a79444fbcb",
      "md5": "67915a57ba319536b2fe9648ae92c8c8",
      "name": "hv_vss_daemon",
      "size": 10712,
      "description": null,
      "package": 1006890,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2021-03-07T11:16:54+00:00",
      "updated_at": "2021-03-07T11:16:54+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2019-13272",
      "risk": 78,
      "source": "DSA",
      "sid": "DSA-4484-1",
      "fixed": null,
      "created_at": "2021-03-08T10:03:26+00:00",
      "updated_at": "2021-03-08T10:03:26+00:00"
    },
    {
      "name": "CVE-2019-13272",
      "risk": 78,
      "source": "DSA",
      "sid": "DSA-4484-1",
      "fixed": {
        "sha256": "d7443cd4d4ceb833f0ba1edbd40ad945f34e059a967072fe4677e3e3228d4565",
        "name": "hyperv-daemons",
        "version": "4.9.168-1+deb9u4",
        "filename": "hyperv-daemons_4.9.168-1+deb9u4_amd64.deb"
      },
      "created_at": "2021-03-09T08:10:30+00:00",
      "updated_at": "2021-03-09T08:10:30+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 0,
  "malicious": 0,
  "created_at": "2019-06-17T18:10:56+00:00",
  "updated_at": "2021-03-07T11:16:54+00:00",
  "deleted_at": null
}