Zercurity data services
  • Summary
  • Applications (1)
  • Packages (0)
  • Vulnerabilities (2)

xvfb

Hashes
Virtual Framebuffer 'fake' X server Xvfb provides an X server that can run on machines with no display hardware and no physical input devices. It emulates a dumb framebuffer using virtual memory. The primary use of this server was intended to be server testing, but other novel uses for it have been found, including testing clients against unusual depths and screen configurations, doing batch processing with Xvfb as a background rendering engine, load testing, as an aid to porting the X server to a new platform, and providing an unobtrusive way to run applications that don't really need an X server but insist on having one anyway. This package also contains a convenience script called xvfb-run which simplifies the automated execution of X clients in a virtual server environment. This convenience script requires the use of the xauth program. More information about X.Org can be found at: <URL:https://www.x.org> This package is built from the X.org xserver module.
  • SHA256: 4428b3b5b5c23d1a964be96f5988d6668d0231a756ea09c43f050611c9022e8a
  • SHA1: eb485f79f068ed12bf0208887ad98e8750bb0af0
  • MD5: 83828a8efed7ce8728dd4bb3533b01fe
Information
  • Version: 2:21.1.3-2ubuntu2.7
  • Filename: xvfb_21.1.3-2ubuntu2.7_amd64.deb
  • Size: 2235
  • Type: DEB
  • Source: xorg-server
  • Architecture: AMD64
  • URL: https://www.x.org/
  • Owner: Ubuntu X-SWAT <ubuntu-x@lists.ubuntu.com>
  • Dependencies: xserver-common (>= 2:21.1.3-2ubuntu2.7), libaudit1 (>= 1:2.2.1), libbsd0 (>= 0.7.0), libc6 (>= 2.35), libgcrypt20 (>= 1.9.0), libgl1, libpixman-1-0 (>= 0.30.0), libselinux1 (>= 3.1~), libsystemd0, libunwind8, libxau6 (>= 1:1.0.9), libxdmcp6, libxfont2 (>= 1:2.0.1), xauth, x11-xkb-utils

Applications

NameTypeArchSizeRisk
Xvfb
/usr/bin/Xvfb
20689600

Vulnerabilities

NameRiskSourceFixed
CVE-2023-13930USN
CVE-2023-13930USN
xvfb
2:21.1.3-2ubuntu2.9

Raw Object

{
  "sha256": "4428b3b5b5c23d1a964be96f5988d6668d0231a756ea09c43f050611c9022e8a",
  "sha1": "eb485f79f068ed12bf0208887ad98e8750bb0af0",
  "md5": "83828a8efed7ce8728dd4bb3533b01fe",
  "type": "DEB",
  "arch": "AMD64",
  "name": "xvfb",
  "filename": "xvfb_21.1.3-2ubuntu2.7_amd64.deb",
  "size": 2235,
  "description": "Virtual Framebuffer 'fake' X server\nXvfb provides an X server that can run on machines with no display hardware\nand no physical input devices. It emulates a dumb framebuffer using virtual\nmemory. The primary use of this server was intended to be server testing,\nbut other novel uses for it have been found, including testing clients\nagainst unusual depths and screen configurations, doing batch processing with\nXvfb as a background rendering engine, load testing, as an aid to porting the\nX server to a new platform, and providing an unobtrusive way to run\napplications that don't really need an X server but insist on having one\nanyway.\n\nThis package also contains a convenience script called xvfb-run which\nsimplifies the automated execution of X clients in a virtual server\nenvironment. This convenience script requires the use of the xauth\nprogram.\n\nMore information about X.Org can be found at:\n<URL:https://www.x.org>\n\nThis package is built from the X.org xserver module.",
  "url": "https://www.x.org/",
  "version": "2:21.1.3-2ubuntu2.7",
  "source": "xorg-server",
  "owner": "Ubuntu X-SWAT <ubuntu-x@lists.ubuntu.com>",
  "dependencies": "xserver-common (>= 2:21.1.3-2ubuntu2.7), libaudit1 (>= 1:2.2.1), libbsd0 (>= 0.7.0), libc6 (>= 2.35), libgcrypt20 (>= 1.9.0), libgl1, libpixman-1-0 (>= 0.30.0), libselinux1 (>= 3.1~), libsystemd0, libunwind8, libxau6 (>= 1:1.0.9), libxdmcp6, libxfont2 (>= 1:2.0.1), xauth, x11-xkb-utils",
  "applications": [
    {
      "path": "/usr/bin/Xvfb",
      "sha256": "f4c2132b6c6756fc764bbaf2e58c9e924b9eb97425f2157153b21c978763fdc2",
      "sha1": "6a408e10d0bd3bb11eecc37f96121198fc043dfd",
      "md5": "6e5e304fc30a8914ea2b07f790dca058",
      "name": "Xvfb",
      "size": 2068960,
      "description": null,
      "package": 5127625,
      "platform": "LINUX",
      "risk": 0,
      "vulnerable": null,
      "outdated": null,
      "malicious": null,
      "created_at": "2023-02-09T10:46:59+00:00",
      "updated_at": "2023-02-09T10:46:59+00:00",
      "deleted_at": null
    }
  ],
  "vulnerabilities": [
    {
      "name": "CVE-2023-1393",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": null,
      "created_at": "2023-03-30T09:32:47+00:00",
      "updated_at": "2023-03-30T09:32:47+00:00"
    },
    {
      "name": "CVE-2023-1393",
      "risk": 0,
      "source": "USN",
      "sid": null,
      "fixed": {
        "sha256": "f0e58c7d304a3ef826880da745ceeaee78aeaf0c5bdb1365f2e13e8407975ae9",
        "name": "xvfb",
        "version": "2:21.1.3-2ubuntu2.9",
        "filename": "xvfb_21.1.3-2ubuntu2.9_amd64.deb"
      },
      "created_at": "2023-03-31T09:11:57+00:00",
      "updated_at": "2023-03-31T09:11:57+00:00"
    }
  ],
  "risk": 0,
  "vulnerable": 0,
  "outdated": 0,
  "malicious": 0,
  "created_at": "2023-02-07T13:07:12+00:00",
  "updated_at": "2023-02-09T10:46:59+00:00",
  "deleted_at": null
}