poppler

Description:PDF rendering library based on the xpdf-3.0 code base
License: GPL-2
Homepage:https://poppler.freedesktop.org/
Location:Portage
Legend:
  • + - stable
  • ~ - unstable
  • M - hardmask
alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86
9999 diff - - - - - - - - - - - - -
23.08.0 diff ~ + + + ~ - ~ + + ~ - + +
23.09.0 ~ ~ ~ ~ ~ - ~ ~ ~ ~ - ~ ~

USE flags

  • boost - Use boost::small_vector for a serious performance gain
  • cairo - Enable support for the cairo graphics library
  • cjk - Add support for Multi-byte character languages (Chinese, Japanese, Korean)
  • curl - Add support for client-side URL transfer library
  • cxx - Build support for C++ (bindings, extra libraries, code generation, ...)
  • debug - Enable extra debug codepaths, like asserts and extra output. If you want to get meaningful backtraces see https://wiki.gentoo.org/wiki/Project:Quality_Assurance/Backtraces
  • doc - Add extra documentation (API, Javadoc, etc). It is recommended to enable per package instead of globally
  • gpgme - Enable signatures handling with app-crypt/gpgme
  • introspection - Add support for GObject based introspection
  • jpeg - Add JPEG image support
  • jpeg2k - Support for JPEG 2000, a wavelet-based image compression format
  • lcms - Add lcms support (color management engine)
  • nss - Enable signatures handling with dev-libs/nss
  • png - Add support for libpng (PNG images)
  • qt5 - Add support for the Qt 5 application and UI framework
  • test - Enable dependencies and/or preparations necessary to run tests (usually controlled by FEATURES=test but can be toggled independently)
  • tiff - Add support for the TIFF image format
  • utils - Install command-line PDF converters and various utilities.
  • verify-sig - Verify upstream signatures on distfiles

Security Advisory

Date Severity Title
about 2 years high Poppler: Arbitrary Code Execution
over 5 years normal Poppler: Multiple vulnerabilities
over 6 years normal Poppler: Multiple vulnerabilities
almost 7 years normal Poppler: Multiple vulnerabilities
about 8 years normal Poppler: Multiple vulnerabilities
almost 11 years normal Poppler: Multiple vulnerabilities
about 11 years normal Poppler: Multiple vulnerabilities
over 16 years normal Poppler: User-assisted execution of arbitrary code
over 16 years normal Poppler: User-assisted execution of arbitrary code
about 17 years normal Poppler, KDE: User-assisted execution of arbitrary code
over 17 years normal Poppler: Two buffer overflow vulnerabilities
almost 19 years normal Xpdf, Poppler: Heap overflow
almost 19 years normal Xpdf, Poppler, GPdf, libextractor, pdftohtml: Heap overflows
about 19 years normal Xpdf, GPdf, CUPS, Poppler: Multiple vulnerabilities

Also available in: Atom

Thank you!