Zercurity data services
  • Summary
  • Applications (3)
  • Packages (0)
  • Vulnerabilities (9)

hyperv-daemons

Hashes
Support daemons for Linux running on Hyper-V Suite of daemons for Linux guests running on Hyper-V, consisting of hv_fcopy_daemon, hv_kvp_daemon and hv_vss_daemon. hv_fcopy_daemon provides the file copy service, allowing the host to copy files into the guest. hv_kvp_daemon provides the key-value pair (KVP) service, allowing the host to get and set the IP networking configuration of the guest. (This requires helper scripts which are not currently included.) hv_vss_daemon provides the volume shadow copy service (VSS), allowing the host to freeze the guest filesystems while taking a snapshot.
  • SHA256: ec49dab3f39cb0dd9ffdcfe3b61df9fca4216dfe4d3a5ca5afebf2ed5f8d1adf
  • SHA1: 1130c19c35d76e9db33d7fe3e9833b5739663c39
  • MD5: fe310c0a63f223d37601dcd47f10b384
Information
  • Version: 5.10.127-1
  • Filename: hyperv-daemons_5.10.127-1_amd64.deb
  • Size: 580
  • Type: DEB
  • Source: linux
  • Architecture: AMD64
  • URL: https://www.kernel.org/
  • Owner: Debian Kernel Team <debian-kernel@lists.debian.org>
  • Dependencies: lsb-base, libc6 (>= 2.4)

Applications

NameTypeArchSizeRisk
hv_fcopy_daemon
/usr/sbin/hv_fcopy_daemon
147120
hv_kvp_daemon
/usr/sbin/hv_kvp_daemon
273520
hv_vss_daemon
/usr/sbin/hv_vss_daemon
148080

Vulnerabilities

NameRiskSourceFixed
CVE-2021-3365578DSA
DSA-5191-1
CVE-2022-23180DSA
DSA-5191-1
CVE-2022-263650DSA
DSA-5191-1
CVE-2022-337400DSA
DSA-5191-1
CVE-2022-337410DSA
DSA-5191-1
CVE-2022-337420DSA
DSA-5191-1
CVE-2022-337430DSA
DSA-5191-1
CVE-2022-337440DSA
DSA-5191-1
CVE-2022-349180DSA
DSA-5191-1

Raw Object

{
  "sha256": "ec49dab3f39cb0dd9ffdcfe3b61df9fca4216dfe4d3a5ca5afebf2ed5f8d1adf",
  "sha1": "1130c19c35d76e9db33d7fe3e9833b5739663c39",
  "md5": "fe310c0a63f223d37601dcd47f10b384",
  "type": "DEB",
  "arch": "AMD64",
  "name": "hyperv-daemons",
  "filename": "hyperv-daemons_5.10.127-1_amd64.deb",
  "size": 580,
  "description": "Support daemons for Linux running on Hyper-V\nSuite of daemons for Linux guests running on Hyper-V, consisting of\nhv_fcopy_daemon, hv_kvp_daemon and hv_vss_daemon.\n\nhv_fcopy_daemon provides the file copy service, allowing the host to copy\nfiles into the guest.\n\nhv_kvp_daemon provides the key-value pair (KVP) service, allowing the host\nto get and set the IP networking configuration of the guest.  (This\nrequires helper scripts which are not currently included.)\n\nhv_vss_daemon provides the volume shadow copy service (VSS), allowing the\nhost to freeze the guest filesystems while taking a snapshot.",
  "url": "https://www.kernel.org/",
  "version": "5.10.127-1",
  "source": "linux",
  "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>",
  "dependencies": "lsb-base, libc6 (>= 2.4)",
  "applications": [
    {
      "path": "/usr/sbin/hv_fcopy_daemon",
      "sha256": "50dad553b7bb8842b5560fa5faefca87532b74d6ac3058a313a89761f9594efd",
      "sha1": "69a45382bf64b8e8c2cd8c8075746a9a54c572b1",
      "md5": "46ed4ccabb63356661d6172ffe3afab6",
      "name": "hv_fcopy_daemon",
      "size": 14712,
      "description": null,
      "package": 3818321,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-07-02T03:20:37+00:00",
      "updated_at": "2022-07-02T03:20:37+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/sbin/hv_kvp_daemon",
      "sha256": "af1c2ac6a9d0b84cf6ae5899475e4a9d60aab4b90ae5c15316a9598c7a7fe559",
      "sha1": "92b5fe5faa30e2eaf21412c1b808fe03028e0f54",
      "md5": "6e647187ec2ccec200e301d2d41f9b7b",
      "name": "hv_kvp_daemon",
      "size": 27352,
      "description": null,
      "package": 3818321,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-07-02T03:20:37+00:00",
      "updated_at": "2022-07-02T03:20:37+00:00",
      "deleted_at": null
    },
    {
      "path": "/usr/sbin/hv_vss_daemon",
      "sha256": "945eb7cd4093bc2097ad0b0f130749845fc2aeeacf9c51497eb424cd84a1ee00",
      "sha1": "6c44631eb23595a54179e959393dd98d4e7434fe",
      "md5": "e7e694560aade81db1aae6abafa0df6b",
      "name": "hv_vss_daemon",
      "size": 14808,
      "description": null,
      "package": 3818321,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2022-07-02T03:20:37+00:00",
      "updated_at": "2022-07-02T03:20:37+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2021-33655",
      "risk": 78,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:16:05+00:00",
      "updated_at": "2022-07-27T20:16:05+00:00"
    },
    {
      "name": "CVE-2022-2318",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:16:37+00:00",
      "updated_at": "2022-07-27T20:16:37+00:00"
    },
    {
      "name": "CVE-2022-26365",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:17:09+00:00",
      "updated_at": "2022-07-27T20:17:09+00:00"
    },
    {
      "name": "CVE-2022-33740",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:17:40+00:00",
      "updated_at": "2022-07-27T20:17:40+00:00"
    },
    {
      "name": "CVE-2022-33741",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:18:13+00:00",
      "updated_at": "2022-07-27T20:18:13+00:00"
    },
    {
      "name": "CVE-2022-33742",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:18:44+00:00",
      "updated_at": "2022-07-27T20:18:44+00:00"
    },
    {
      "name": "CVE-2022-33743",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:19:14+00:00",
      "updated_at": "2022-07-27T20:19:14+00:00"
    },
    {
      "name": "CVE-2022-33744",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:19:45+00:00",
      "updated_at": "2022-07-27T20:19:45+00:00"
    },
    {
      "name": "CVE-2022-34918",
      "risk": 0,
      "source": "DSA",
      "sid": "DSA-5191-1",
      "fixed": null,
      "created_at": "2022-07-27T20:20:17+00:00",
      "updated_at": "2022-07-27T20:20:17+00:00"
    }
  ],
  "risk": 78,
  "vulnerable": 78,
  "outdated": 78,
  "malicious": 0,
  "created_at": "2022-07-01T07:14:06+00:00",
  "updated_at": "2022-07-02T02:20:37+00:00",
  "deleted_at": null
}