6cc407022862ba442818d0e0d594cc9fcee7f0bf9f9920a75d5d70cef5df1566
f80fec63a2ae44eaf1936387397fd48ce454ad42
7495cbf4e9d099a95ac5422395a16198
4.9.168-1+deb9u2
hyperv-daemons_4.9.168-1+deb9u2_amd64.deb
705
DEB
linux
AMD64
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
lsb-base, libc6 (>= 2.4), init-system-helpers (>= 1.18~)
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
check-hyperv /lib/hyperv-daemons/check-hyperv | 6320 | 0 | ||
hv_fcopy_daemon /usr/sbin/hv_fcopy_daemon | 10680 | 0 | ||
hv_kvp_daemon /usr/sbin/hv_kvp_daemon | 23320 | 0 | ||
hv_vss_daemon /usr/sbin/hv_vss_daemon | 10712 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2019-3846 | 88 | DSA DSA-4465-1 | hyperv-daemons 4.9.168-1+deb9u3 |
CVE-2019-5489 | 55 | DSA DSA-4465-1 | hyperv-daemons 4.9.168-1+deb9u3 |
CVE-2019-9500 | 83 | DSA DSA-4465-1 | hyperv-daemons 4.9.168-1+deb9u3 |
CVE-2019-9503 | 83 | DSA DSA-4465-1 | hyperv-daemons 4.9.168-1+deb9u3 |
CVE-2019-10126 | 98 | DSA DSA-4465-1 | hyperv-daemons 4.9.168-1+deb9u3 |
CVE-2019-11477 | 78 | DSA DSA-4465-1 | hyperv-daemons 4.9.168-1+deb9u3 |
CVE-2019-11478 | 75 | DSA DSA-4465-1 | hyperv-daemons 4.9.168-1+deb9u3 |
CVE-2019-11479 | 75 | DSA DSA-4465-1 | hyperv-daemons 4.9.168-1+deb9u3 |
CVE-2019-11486 | 70 | DSA DSA-4465-1 | hyperv-daemons 4.9.168-1+deb9u3 |
CVE-2019-11599 | 70 | DSA DSA-4465-1 | hyperv-daemons 4.9.168-1+deb9u3 |
CVE-2019-11815 | 93 | DSA DSA-4465-1 | hyperv-daemons 4.9.168-1+deb9u3 |
CVE-2019-11833 | 55 | DSA DSA-4465-1 | hyperv-daemons 4.9.168-1+deb9u3 |
CVE-2019-11884 | 33 | DSA DSA-4465-1 | hyperv-daemons 4.9.168-1+deb9u3 |
{ "sha256": "6cc407022862ba442818d0e0d594cc9fcee7f0bf9f9920a75d5d70cef5df1566", "sha1": "f80fec63a2ae44eaf1936387397fd48ce454ad42", "md5": "7495cbf4e9d099a95ac5422395a16198", "type": "DEB", "arch": "AMD64", "name": "hyperv-daemons", "filename": "hyperv-daemons_4.9.168-1+deb9u2_amd64.deb", "size": 705, "description": "Support daemons for Linux running on Hyper-V\nSuite of daemons for Linux guests running on Hyper-V, consisting of\nhv_fcopy_daemon, hv_kvp_daemon and hv_vss_daemon.\n\nhv_fcopy_daemon provides the file copy service, allowing the host to copy\nfiles into the guest.\n\nhv_kvp_daemon provides the key-value pair (KVP) service, allowing the host\nto get and set the IP networking configuration of the guest. (This\nrequires helper scripts which are not currently included.)\n\nhv_vss_daemon provides the volume shadow copy service (VSS), allowing the\nhost to freeze the guest filesystems while taking a snapshot.", "url": "https://www.kernel.org/", "version": "4.9.168-1+deb9u2", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "lsb-base, libc6 (>= 2.4), init-system-helpers (>= 1.18~)", "applications": [ { "path": "/lib/hyperv-daemons/check-hyperv", "sha256": "e19976eee69b8860ff695f5087760b47d14c8c768930fc36c846e55ac6cd7f19", "sha1": "7ae307166bdf6705838d322a03fdd1f7a251171e", "md5": "f8dd856476b7bf9be2f469b752df84e2", "name": "check-hyperv", "size": 6320, "description": null, "package": 994394, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-07T08:21:53+00:00", "updated_at": "2021-03-07T08:21:53+00:00", "deleted_at": null }, { "path": "/usr/sbin/hv_fcopy_daemon", "sha256": "3f062b5efbcfbdd8ff69c395a3a438105941961d5dd15a6f640afabe8ec3b2a4", "sha1": "66fa6fc642cf5a6bb0098a4e4f0d35d2f2e53cad", "md5": "a02aba66ab5cb206f8c23db2f3eea1af", "name": "hv_fcopy_daemon", "size": 10680, "description": null, "package": 994394, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-07T08:21:53+00:00", "updated_at": "2021-03-07T08:21:53+00:00", "deleted_at": null }, { "path": "/usr/sbin/hv_kvp_daemon", "sha256": "e71db309312c70c39a814203661771edcd281bb972cf490852fff58312416034", "sha1": "a696423c5df3a5241c2c1f8b0aff41b1f035a5e7", "md5": "a4917d4622b712bae5bbda03a1a8d2b9", "name": "hv_kvp_daemon", "size": 23320, "description": null, "package": 994394, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-07T08:21:53+00:00", "updated_at": "2021-03-07T08:21:53+00:00", "deleted_at": null }, { "path": "/usr/sbin/hv_vss_daemon", "sha256": "6f9e8f7ba990495354c67698b7352e6f8b20e6b5920ef2f69e24e41e2103c6d9", "sha1": "a6678b8adbf018b669f092cf64afb418749f9b06", "md5": "5c25ddd1ad4e7aa0fb22597a224b82c7", "name": "hv_vss_daemon", "size": 10712, "description": null, "package": 994394, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2021-03-07T08:21:53+00:00", "updated_at": "2021-03-07T08:21:53+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2019-3846", "risk": 88, "source": "DSA", "sid": "DSA-4465-1", "fixed": { "sha256": "62a5345199146142c2eff3fe9550a28074bc687189c53fb9236b9bfbf033bb60", "name": "hyperv-daemons", "version": "4.9.168-1+deb9u3", "filename": "hyperv-daemons_4.9.168-1+deb9u3_amd64.deb" }, "created_at": "2021-03-08T10:04:54+00:00", "updated_at": "2021-03-08T10:04:54+00:00" }, { "name": "CVE-2019-5489", "risk": 55, "source": "DSA", "sid": "DSA-4465-1", "fixed": { "sha256": "62a5345199146142c2eff3fe9550a28074bc687189c53fb9236b9bfbf033bb60", "name": "hyperv-daemons", "version": "4.9.168-1+deb9u3", "filename": "hyperv-daemons_4.9.168-1+deb9u3_amd64.deb" }, "created_at": "2021-03-08T10:04:54+00:00", "updated_at": "2021-03-08T10:04:54+00:00" }, { "name": "CVE-2019-9500", "risk": 83, "source": "DSA", "sid": "DSA-4465-1", "fixed": { "sha256": "62a5345199146142c2eff3fe9550a28074bc687189c53fb9236b9bfbf033bb60", "name": "hyperv-daemons", "version": "4.9.168-1+deb9u3", "filename": "hyperv-daemons_4.9.168-1+deb9u3_amd64.deb" }, "created_at": "2021-03-08T10:04:55+00:00", "updated_at": "2021-03-08T10:04:55+00:00" }, { "name": "CVE-2019-9503", "risk": 83, "source": "DSA", "sid": "DSA-4465-1", "fixed": { "sha256": "62a5345199146142c2eff3fe9550a28074bc687189c53fb9236b9bfbf033bb60", "name": "hyperv-daemons", "version": "4.9.168-1+deb9u3", "filename": "hyperv-daemons_4.9.168-1+deb9u3_amd64.deb" }, "created_at": "2021-03-08T10:04:56+00:00", "updated_at": "2021-03-08T10:04:56+00:00" }, { "name": "CVE-2019-10126", "risk": 98, "source": "DSA", "sid": "DSA-4465-1", "fixed": { "sha256": "62a5345199146142c2eff3fe9550a28074bc687189c53fb9236b9bfbf033bb60", "name": "hyperv-daemons", "version": "4.9.168-1+deb9u3", "filename": "hyperv-daemons_4.9.168-1+deb9u3_amd64.deb" }, "created_at": "2021-03-08T10:04:57+00:00", "updated_at": "2021-03-08T10:04:57+00:00" }, { "name": "CVE-2019-11477", "risk": 78, "source": "DSA", "sid": "DSA-4465-1", "fixed": { "sha256": "62a5345199146142c2eff3fe9550a28074bc687189c53fb9236b9bfbf033bb60", "name": "hyperv-daemons", "version": "4.9.168-1+deb9u3", "filename": "hyperv-daemons_4.9.168-1+deb9u3_amd64.deb" }, "created_at": "2021-03-08T10:04:58+00:00", "updated_at": "2021-03-08T10:04:58+00:00" }, { "name": "CVE-2019-11478", "risk": 75, "source": "DSA", "sid": "DSA-4465-1", "fixed": { "sha256": "62a5345199146142c2eff3fe9550a28074bc687189c53fb9236b9bfbf033bb60", "name": "hyperv-daemons", "version": "4.9.168-1+deb9u3", "filename": "hyperv-daemons_4.9.168-1+deb9u3_amd64.deb" }, "created_at": "2021-03-08T10:04:59+00:00", "updated_at": "2021-03-08T10:04:59+00:00" }, { "name": "CVE-2019-11479", "risk": 75, "source": "DSA", "sid": "DSA-4465-1", "fixed": { "sha256": "62a5345199146142c2eff3fe9550a28074bc687189c53fb9236b9bfbf033bb60", "name": "hyperv-daemons", "version": "4.9.168-1+deb9u3", "filename": "hyperv-daemons_4.9.168-1+deb9u3_amd64.deb" }, "created_at": "2021-03-08T10:04:59+00:00", "updated_at": "2021-03-08T10:04:59+00:00" }, { "name": "CVE-2019-11486", "risk": 70, "source": "DSA", "sid": "DSA-4465-1", "fixed": { "sha256": "62a5345199146142c2eff3fe9550a28074bc687189c53fb9236b9bfbf033bb60", "name": "hyperv-daemons", "version": "4.9.168-1+deb9u3", "filename": "hyperv-daemons_4.9.168-1+deb9u3_amd64.deb" }, "created_at": "2021-03-08T10:05:00+00:00", "updated_at": "2021-03-08T10:05:00+00:00" }, { "name": "CVE-2019-11599", "risk": 70, "source": "DSA", "sid": "DSA-4465-1", "fixed": { "sha256": "62a5345199146142c2eff3fe9550a28074bc687189c53fb9236b9bfbf033bb60", "name": "hyperv-daemons", "version": "4.9.168-1+deb9u3", "filename": "hyperv-daemons_4.9.168-1+deb9u3_amd64.deb" }, "created_at": "2021-03-08T10:05:01+00:00", "updated_at": "2021-03-08T10:05:01+00:00" }, { "name": "CVE-2019-11815", "risk": 93, "source": "DSA", "sid": "DSA-4465-1", "fixed": { "sha256": "62a5345199146142c2eff3fe9550a28074bc687189c53fb9236b9bfbf033bb60", "name": "hyperv-daemons", "version": "4.9.168-1+deb9u3", "filename": "hyperv-daemons_4.9.168-1+deb9u3_amd64.deb" }, "created_at": "2021-03-08T10:05:01+00:00", "updated_at": "2021-03-08T10:05:01+00:00" }, { "name": "CVE-2019-11833", "risk": 55, "source": "DSA", "sid": "DSA-4465-1", "fixed": { "sha256": "62a5345199146142c2eff3fe9550a28074bc687189c53fb9236b9bfbf033bb60", "name": "hyperv-daemons", "version": "4.9.168-1+deb9u3", "filename": "hyperv-daemons_4.9.168-1+deb9u3_amd64.deb" }, "created_at": "2021-03-08T10:05:02+00:00", "updated_at": "2021-03-08T10:05:02+00:00" }, { "name": "CVE-2019-11884", "risk": 33, "source": "DSA", "sid": "DSA-4465-1", "fixed": { "sha256": "62a5345199146142c2eff3fe9550a28074bc687189c53fb9236b9bfbf033bb60", "name": "hyperv-daemons", "version": "4.9.168-1+deb9u3", "filename": "hyperv-daemons_4.9.168-1+deb9u3_amd64.deb" }, "created_at": "2021-03-08T10:05:03+00:00", "updated_at": "2021-03-08T10:05:03+00:00" } ], "risk": 98, "vulnerable": 98, "outdated": 0, "malicious": 0, "created_at": "2019-05-14T11:12:28+00:00", "updated_at": "2021-03-07T08:21:53+00:00", "deleted_at": null }