Zercurity data services
  • Summary
  • Applications (3)
  • Packages (0)
  • Vulnerabilities (14)

hyperv-daemons

Hashes
Support daemons for Linux running on Hyper-V Suite of daemons for Linux guests running on Hyper-V, consisting of hv_fcopy_daemon, hv_kvp_daemon and hv_vss_daemon. hv_fcopy_daemon provides the file copy service, allowing the host to copy files into the guest. hv_kvp_daemon provides the key-value pair (KVP) service, allowing the host to get and set the IP networking configuration of the guest. (This requires helper scripts which are not currently included.) hv_vss_daemon provides the volume shadow copy service (VSS), allowing the host to freeze the guest filesystems while taking a snapshot.
  • SHA256: e0a4b3a80e50439d307f9bd5c7588846078e77e3d7761b3f9a529a5dfffe6c02
  • SHA1: f5f6fe22ae384bedf12d20e09d5ce9a0fd691aaf
  • MD5: 49fce6ace3add3f3917a343a04e8d9c3
Information
  • Version: 5.10.120-1~bpo10+1
  • Filename: hyperv-daemons_5.10.120-1~bpo10+1_amd64.deb
  • Size: 565
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • URL: https://www.kernel.org/
  • Owner: Debian Kernel Team <debian-kernel@lists.debian.org>
  • Dependencies: lsb-base, libc6 (>= 2.4)

Applications

NameTypeArchSizeRisk
hv_fcopy_daemon
/usr/sbin/hv_fcopy_daemon
147120
hv_kvp_daemon
/usr/sbin/hv_kvp_daemon
273520
hv_vss_daemon
/usr/sbin/hv_vss_daemon
148080

Vulnerabilities

NameRiskSourceFixed
CVE-2022-04940DSA
DSA-5161-1
CVE-2022-085455DSA
DSA-5161-1
CVE-2022-101291DSA
DSA-5161-1
CVE-2022-172970DSA
DSA-5161-1
CVE-2022-17860DSA
DSA-5161-1
CVE-2022-17890DSA
DSA-5161-1
CVE-2022-18520DSA
DSA-5161-1
CVE-2022-322500DSA
DSA-5161-1
CVE-2022-19720DSA
DSA-5161-1
CVE-2022-197441DSA
DSA-5161-1
CVE-2022-197555DSA
DSA-5161-1
CVE-2022-2149967DSA
DSA-5161-1
CVE-2022-2889378DSA
DSA-5161-1
CVE-2022-20780DSA
DSA-5161-1

Raw Object

{
  "sha256": "e0a4b3a80e50439d307f9bd5c7588846078e77e3d7761b3f9a529a5dfffe6c02",
  "sha1": "f5f6fe22ae384bedf12d20e09d5ce9a0fd691aaf",
  "md5": "49fce6ace3add3f3917a343a04e8d9c3",
  "type": "DEB",
  "arch": "AMD64",
  "name": "hyperv-daemons",
  "filename": "hyperv-daemons_5.10.120-1~bpo10+1_amd64.deb",
  "size": 565,
  "description": "Support daemons for Linux running on Hyper-V\nSuite of daemons for Linux guests running on Hyper-V, consisting of\nhv_fcopy_daemon, hv_kvp_daemon and hv_vss_daemon.\n\nhv_fcopy_daemon provides the file copy service, allowing the host to copy\nfiles into the guest.\n\nhv_kvp_daemon provides the key-value pair (KVP) service, allowing the host\nto get and set the IP networking configuration of the guest.  (This\nrequires helper scripts which are not currently included.)\n\nhv_vss_daemon provides the volume shadow copy service (VSS), allowing the\nhost to freeze the guest filesystems while taking a snapshot.",
  "url": "https://www.kernel.org/",
  "version": "5.10.120-1~bpo10+1",
  "source": "linux",
  "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>",
  "dependencies": "lsb-base, libc6 (>= 2.4)",
  "applications": [
    {
      "path": "/usr/sbin/hv_fcopy_daemon",
      "sha256": "d9fbc6af072d0881cd113ce97a89a02f2519c9ca9dd8e08a0d2173abca5a624d",
      "sha1": "610b94e0ae7b22d02a23dd54002f91bd31988c83",
      "md5": "a53c8a6345428fb69c87eaace4649217",
      "name": "hv_fcopy_daemon",
      "size": 14712,
      "description": null,
      "package": 3794640,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-21T02:27:32+00:00",
      "updated_at": "2022-06-21T02:27:32+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/sbin/hv_kvp_daemon",
      "sha256": "8092f411ec74f7c840b3f15b932844003fc561c268c476413936809362b7428b",
      "sha1": "6480560aa23a8f4ff7752a9c4064590530c715ad",
      "md5": "d8193ec949c23345b80d21327f6e6fd3",
      "name": "hv_kvp_daemon",
      "size": 27352,
      "description": null,
      "package": 3794640,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-21T02:27:32+00:00",
      "updated_at": "2022-06-21T02:27:32+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/sbin/hv_vss_daemon",
      "sha256": "c50f863f5ed670e3783b1bdece3d8f84781bd3d2b9d8a5b12ff7704c7b8a82fb",
      "sha1": "c148856807be7bb78c8f161775401be81536696b",
      "md5": "621026af9db405a66dd3b3b97e4ea75a",
      "name": "hv_vss_daemon",
      "size": 14808,
      "description": null,
      "package": 3794640,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-06-21T02:27:32+00:00",
      "updated_at": "2022-06-21T02:27:32+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2022-0494",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:44:04+00:00",
      "updated_at": "2022-07-27T20:44:04+00:00"
    },
    {
      "name": "CVE-2022-0854",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:44:35+00:00",
      "updated_at": "2022-07-27T20:44:35+00:00"
    },
    {
      "name": "CVE-2022-1012",
      "risk": 91,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:45:07+00:00",
      "updated_at": "2022-07-27T20:45:07+00:00"
    },
    {
      "name": "CVE-2022-1729",
      "risk": 70,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:45:38+00:00",
      "updated_at": "2022-07-27T20:45:38+00:00"
    },
    {
      "name": "CVE-2022-1786",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:46:12+00:00",
      "updated_at": "2022-07-27T20:46:12+00:00"
    },
    {
      "name": "CVE-2022-1789",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:46:44+00:00",
      "updated_at": "2022-07-27T20:46:44+00:00"
    },
    {
      "name": "CVE-2022-1852",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:47:20+00:00",
      "updated_at": "2022-07-27T20:47:20+00:00"
    },
    {
      "name": "CVE-2022-32250",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:47:55+00:00",
      "updated_at": "2022-07-27T20:47:55+00:00"
    },
    {
      "name": "CVE-2022-1972",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:48:31+00:00",
      "updated_at": "2022-07-27T20:48:31+00:00"
    },
    {
      "name": "CVE-2022-1974",
      "risk": 41,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:49:04+00:00",
      "updated_at": "2022-07-27T20:49:04+00:00"
    },
    {
      "name": "CVE-2022-1975",
      "risk": 55,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:49:42+00:00",
      "updated_at": "2022-07-27T20:49:42+00:00"
    },
    {
      "name": "CVE-2022-21499",
      "risk": 67,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:50:15+00:00",
      "updated_at": "2022-07-27T20:50:15+00:00"
    },
    {
      "name": "CVE-2022-28893",
      "risk": 78,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-07-27T20:50:46+00:00",
      "updated_at": "2022-07-27T20:50:46+00:00"
    },
    {
      "name": "CVE-2022-2078",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5161-1",
      "fixed": null,
      "created_at": "2022-09-18T15:51:32+00:00",
      "updated_at": "2022-09-18T15:51:32+00:00"
    }
  ],
  "risk": 91,
  "vulnerable": 91,
  "outdated": 91,
  "malicious": 0,
  "created_at": "2022-06-20T19:47:19+00:00",
  "updated_at": "2022-06-21T01:27:32+00:00",
  "deleted_at": null
}