poppler

Описание:PDF rendering library based on the xpdf-3.0 code base
Лицензия: GPL-2
Домашняя страница:https://poppler.freedesktop.org/
Расположение:Portage
Легенда:
  • + - стабильный
  • ~ - нестабильный
  • M - замаскированный
alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86
9999 diff - - - - - - - - - - - - -
23.08.0 diff ~ + + + ~ - ~ + + ~ - + +
23.09.0 ~ ~ ~ ~ ~ - ~ ~ ~ ~ - ~ ~

USE флаги

  • boost - Use boost::small_vector for a serious performance gain
  • cairo - Enable support for the cairo graphics library
  • cjk - Add support for Multi-byte character languages (Chinese, Japanese, Korean)
  • curl - Add support for client-side URL transfer library
  • cxx - Build support for C++ (bindings, extra libraries, code generation, ...)
  • debug - Enable extra debug codepaths, like asserts and extra output. If you want to get meaningful backtraces see https://wiki.gentoo.org/wiki/Project:Quality_Assurance/Backtraces
  • doc - Add extra documentation (API, Javadoc, etc). It is recommended to enable per package instead of globally
  • gpgme - Enable signatures handling with app-crypt/gpgme
  • introspection - Add support for GObject based introspection
  • jpeg - Add JPEG image support
  • jpeg2k - Support for JPEG 2000, a wavelet-based image compression format
  • lcms - Add lcms support (color management engine)
  • nss - Enable signatures handling with dev-libs/nss
  • png - Add support for libpng (PNG images)
  • qt5 - Add support for the Qt 5 application and UI framework
  • test - Enable dependencies and/or preparations necessary to run tests (usually controlled by FEATURES=test but can be toggled independently)
  • tiff - Add support for the TIFF image format
  • utils - Install command-line PDF converters and various utilities.
  • verify-sig - Verify upstream signatures on distfiles

Советы по безопасности

Дата Опасность Заголовок
около 2 лет высокая Poppler: Arbitrary Code Execution
больше 5 лет средняя Poppler: Multiple vulnerabilities
больше 6 лет средняя Poppler: Multiple vulnerabilities
почти 7 года средняя Poppler: Multiple vulnerabilities
почти 9 года средняя Poppler: Multiple vulnerabilities
почти 11 года средняя Poppler: Multiple vulnerabilities
около 11 лет средняя Poppler: Multiple vulnerabilities
больше 16 лет средняя Poppler: User-assisted execution of arbitrary code
больше 16 лет средняя Poppler: User-assisted execution of arbitrary code
около 17 лет средняя Poppler, KDE: User-assisted execution of arbitrary code
около 17 лет средняя Poppler: Two buffer overflow vulnerabilities
почти 19 года средняя Xpdf, Poppler: Heap overflow
почти 19 года средняя Xpdf, Poppler, GPdf, libextractor, pdftohtml: Heap overflows
почти 19 года средняя Xpdf, GPdf, CUPS, Poppler: Multiple vulnerabilities

Экспортировать в Atom

Спасибо!