ec49dab3f39cb0dd9ffdcfe3b61df9fca4216dfe4d3a5ca5afebf2ed5f8d1adf
1130c19c35d76e9db33d7fe3e9833b5739663c39
fe310c0a63f223d37601dcd47f10b384
5.10.127-1
hyperv-daemons_5.10.127-1_amd64.deb
580
DEB
linux
AMD64
https://www.kernel.org/
Debian Kernel Team <debian-kernel@lists.debian.org>
lsb-base, libc6 (>= 2.4)
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
hv_fcopy_daemon /usr/sbin/hv_fcopy_daemon | 14712 | 0 | ||
hv_kvp_daemon /usr/sbin/hv_kvp_daemon | 27352 | 0 | ||
hv_vss_daemon /usr/sbin/hv_vss_daemon | 14808 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2021-33655 | 78 | DSA DSA-5191-1 | |
CVE-2022-2318 | 0 | DSA DSA-5191-1 | |
CVE-2022-26365 | 0 | DSA DSA-5191-1 | |
CVE-2022-33740 | 0 | DSA DSA-5191-1 | |
CVE-2022-33741 | 0 | DSA DSA-5191-1 | |
CVE-2022-33742 | 0 | DSA DSA-5191-1 | |
CVE-2022-33743 | 0 | DSA DSA-5191-1 | |
CVE-2022-33744 | 0 | DSA DSA-5191-1 | |
CVE-2022-34918 | 0 | DSA DSA-5191-1 |
{ "sha256": "ec49dab3f39cb0dd9ffdcfe3b61df9fca4216dfe4d3a5ca5afebf2ed5f8d1adf", "sha1": "1130c19c35d76e9db33d7fe3e9833b5739663c39", "md5": "fe310c0a63f223d37601dcd47f10b384", "type": "DEB", "arch": "AMD64", "name": "hyperv-daemons", "filename": "hyperv-daemons_5.10.127-1_amd64.deb", "size": 580, "description": "Support daemons for Linux running on Hyper-V\nSuite of daemons for Linux guests running on Hyper-V, consisting of\nhv_fcopy_daemon, hv_kvp_daemon and hv_vss_daemon.\n\nhv_fcopy_daemon provides the file copy service, allowing the host to copy\nfiles into the guest.\n\nhv_kvp_daemon provides the key-value pair (KVP) service, allowing the host\nto get and set the IP networking configuration of the guest. (This\nrequires helper scripts which are not currently included.)\n\nhv_vss_daemon provides the volume shadow copy service (VSS), allowing the\nhost to freeze the guest filesystems while taking a snapshot.", "url": "https://www.kernel.org/", "version": "5.10.127-1", "source": "linux", "owner": "Debian Kernel Team <debian-kernel@lists.debian.org>", "dependencies": "lsb-base, libc6 (>= 2.4)", "applications": [ { "path": "/usr/sbin/hv_fcopy_daemon", "sha256": "50dad553b7bb8842b5560fa5faefca87532b74d6ac3058a313a89761f9594efd", "sha1": "69a45382bf64b8e8c2cd8c8075746a9a54c572b1", "md5": "46ed4ccabb63356661d6172ffe3afab6", "name": "hv_fcopy_daemon", "size": 14712, "description": null, "package": 3818321, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-02T03:20:37+00:00", "updated_at": "2022-07-02T03:20:37+00:00", "deleted_at": null }, { "path": "/usr/sbin/hv_kvp_daemon", "sha256": "af1c2ac6a9d0b84cf6ae5899475e4a9d60aab4b90ae5c15316a9598c7a7fe559", "sha1": "92b5fe5faa30e2eaf21412c1b808fe03028e0f54", "md5": "6e647187ec2ccec200e301d2d41f9b7b", "name": "hv_kvp_daemon", "size": 27352, "description": null, "package": 3818321, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-02T03:20:37+00:00", "updated_at": "2022-07-02T03:20:37+00:00", "deleted_at": null }, { "path": "/usr/sbin/hv_vss_daemon", "sha256": "945eb7cd4093bc2097ad0b0f130749845fc2aeeacf9c51497eb424cd84a1ee00", "sha1": "6c44631eb23595a54179e959393dd98d4e7434fe", "md5": "e7e694560aade81db1aae6abafa0df6b", "name": "hv_vss_daemon", "size": 14808, "description": null, "package": 3818321, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2022-07-02T03:20:37+00:00", "updated_at": "2022-07-02T03:20:37+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2021-33655", "risk": 78, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:16:05+00:00", "updated_at": "2022-07-27T20:16:05+00:00" }, { "name": "CVE-2022-2318", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:16:37+00:00", "updated_at": "2022-07-27T20:16:37+00:00" }, { "name": "CVE-2022-26365", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:17:09+00:00", "updated_at": "2022-07-27T20:17:09+00:00" }, { "name": "CVE-2022-33740", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:17:40+00:00", "updated_at": "2022-07-27T20:17:40+00:00" }, { "name": "CVE-2022-33741", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:18:13+00:00", "updated_at": "2022-07-27T20:18:13+00:00" }, { "name": "CVE-2022-33742", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:18:44+00:00", "updated_at": "2022-07-27T20:18:44+00:00" }, { "name": "CVE-2022-33743", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:19:14+00:00", "updated_at": "2022-07-27T20:19:14+00:00" }, { "name": "CVE-2022-33744", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:19:45+00:00", "updated_at": "2022-07-27T20:19:45+00:00" }, { "name": "CVE-2022-34918", "risk": 0, "source": "DSA", "sid": "DSA-5191-1", "fixed": null, "created_at": "2022-07-27T20:20:17+00:00", "updated_at": "2022-07-27T20:20:17+00:00" } ], "risk": 78, "vulnerable": 78, "outdated": 78, "malicious": 0, "created_at": "2022-07-01T07:14:06+00:00", "updated_at": "2022-07-02T02:20:37+00:00", "deleted_at": null }