e56e1b396f917f1900259117f4e28d37617b8d13e772752a965d01d9d14cb8fd
6c2d14d0f6bb838a509b492c80cb44a873e82a38
31a7290c6134d96a06ce39618bf0bd08
2:1.20.11-1+deb11u5
xvfb_1.20.11-1+deb11u5_i386.deb
4505
DEB
xorg-server
I386
https://www.x.org/
Debian X Strike Force <debian-x@lists.debian.org>
xserver-common (>= 2:1.20.11-1+deb11u5), libaudit1 (>= 1:2.2.1), libbsd0 (>= 0.7.0), libc6 (>= 2.29), libgcrypt20 (>= 1.8.0), libgl1, libpixman-1-0 (>= 0.30.0), libselinux1 (>= 3.1~), libsystemd0, libunwind8, libxau6 (>= 1:1.0.9), libxdmcp6, libxfont2 (>= 1:2.0.1)
Name | Type | Arch | Size | Risk |
---|---|---|---|---|
Xvfb /usr/bin/Xvfb | 2236752 | 0 |
Name | Risk | Source | Fixed |
---|---|---|---|
CVE-2023-1393 | 0 | DSA DSA-5380-1 | xvfb 2:1.20.11-1+deb11u6 |
{ "sha256": "e56e1b396f917f1900259117f4e28d37617b8d13e772752a965d01d9d14cb8fd", "sha1": "6c2d14d0f6bb838a509b492c80cb44a873e82a38", "md5": "31a7290c6134d96a06ce39618bf0bd08", "type": "DEB", "arch": "I386", "name": "xvfb", "filename": "xvfb_1.20.11-1+deb11u5_i386.deb", "size": 4505, "description": "Virtual Framebuffer 'fake' X server\nXvfb provides an X server that can run on machines with no display hardware\nand no physical input devices. It emulates a dumb framebuffer using virtual\nmemory. The primary use of this server was intended to be server testing,\nbut other novel uses for it have been found, including testing clients\nagainst unusual depths and screen configurations, doing batch processing with\nXvfb as a background rendering engine, load testing, as an aid to porting the\nX server to a new platform, and providing an unobtrusive way to run\napplications that don't really need an X server but insist on having one\nanyway.\n\nThis package also contains a convenience script called xvfb-run which\nsimplifies the automated execution of X clients in a virtual server\nenvironment. This convenience script requires the use of the xauth\nprogram.\n\nMore information about X.Org can be found at:\n<URL:https://www.x.org>\n\nThis package is built from the X.org xserver module.", "url": "https://www.x.org/", "version": "2:1.20.11-1+deb11u5", "source": "xorg-server", "owner": "Debian X Strike Force <debian-x@lists.debian.org>", "dependencies": "xserver-common (>= 2:1.20.11-1+deb11u5), libaudit1 (>= 1:2.2.1), libbsd0 (>= 0.7.0), libc6 (>= 2.29), libgcrypt20 (>= 1.8.0), libgl1, libpixman-1-0 (>= 0.30.0), libselinux1 (>= 3.1~), libsystemd0, libunwind8, libxau6 (>= 1:1.0.9), libxdmcp6, libxfont2 (>= 1:2.0.1)", "applications": [ { "path": "/usr/bin/Xvfb", "sha256": "9f35a6ada13682512fd256383a06de1f285d490c43e0ea865ca45ec7d2f33ff5", "sha1": "9271e0cecd385eadfd259fd21683611ad16a41f1", "md5": "077b3b859ed549d6e2f6666acd57f3f9", "name": "Xvfb", "size": 2236752, "description": null, "package": 5126554, "platform": "LINUX", "risk": 0, "vulnerable": null, "outdated": null, "malicious": null, "created_at": "2023-02-09T10:34:37+00:00", "updated_at": "2023-02-09T10:34:37+00:00", "deleted_at": null } ], "vulnerabilities": [ { "name": "CVE-2023-1393", "risk": 0, "source": "DSA", "sid": "DSA-5380-1", "fixed": { "sha256": "82df09832a4078ebd85cd371e441e542111dc0205e08f1fae524fab73f064aa6", "name": "xvfb", "version": "2:1.20.11-1+deb11u6", "filename": "xvfb_1.20.11-1+deb11u6_i386.deb" }, "created_at": "2023-03-31T09:11:19+00:00", "updated_at": "2023-03-31T09:11:19+00:00" } ], "risk": 0, "vulnerable": 0, "outdated": 0, "malicious": 0, "created_at": "2023-02-01T15:19:56+00:00", "updated_at": "2023-02-09T10:34:37+00:00", "deleted_at": null }