poppler

Description:PDF rendering library based on the xpdf-3.0 code base
License: GPL-2
Homepage:https://poppler.freedesktop.org/
Location:Portage
Legend:
  • + - stable
  • ~ - unstable
  • M - hardmask
alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86
9999 diff - - - - - - - - - - - - -
0.60.1 diff ~ ~ ~ ~ ~ - ~ ~ ~ ~ ~ ~ ~
0.59.0 diff ~ ~ ~ ~ ~ - ~ ~ ~ ~ ~ ~ ~
0.58.0 diff ~ ~ ~ ~ ~ - ~ ~ ~ ~ ~ ~ ~
0.57.0 diff ~ + + + + - ~ + + ~ ~ ~ +
0.45.0 + + + + + - ~ + + ~ ~ + +

USE flags

  • cairo - Enable support for the cairo graphics library
  • cairo-qt - Enable experimental Cairo font rasterizer for Qt4 backend.
  • cjk - Add support for Multi-byte character languages (Chinese, Japanese, Korean)
  • curl - Add support for client-side URL transfer library
  • cxx - Build support for C++ (bindings, extra libraries, code generation, ...)
  • debug - Enable extra debug codepaths, like asserts and extra output. If you want to get meaningful backtraces see https://wiki.gentoo.org/wiki/Project:Quality_Assurance/Backtraces
  • doc - Add extra documentation (API, Javadoc, etc). It is recommended to enable per package instead of globally
  • introspection - Add support for GObject based introspection
  • jpeg - Add JPEG image support
  • jpeg2k - Support for JPEG 2000, a wavelet-based image compression format
  • lcms - Add lcms support (color management engine)
  • nss - Enable signatures handling with dev-libs/nss
  • png - Add support for libpng (PNG images)
  • qt4 - Add support for the Qt GUI/Application Toolkit version 4.x
  • qt5 - Add support for the Qt 5 application and UI framework
  • tiff - Add support for the TIFF image format
  • utils - Install command-line PDF converters and various utilities.

Security Advisory

Date Severity Title
11 months normal Poppler: Multiple vulnerabilities
over 3 years normal Poppler: Multiple vulnerabilities
about 4 years normal Poppler: Multiple vulnerabilities
over 9 years normal Poppler: User-assisted execution of arbitrary code
over 9 years normal Poppler: User-assisted execution of arbitrary code
almost 10 years normal Poppler, KDE: User-assisted execution of arbitrary code
about 10 years normal Poppler: Two buffer overflow vulnerabilities
over 11 years normal Xpdf, Poppler: Heap overflow
over 11 years normal Xpdf, Poppler, GPdf, libextractor, pdftohtml: Heap overflows
almost 12 years normal Xpdf, GPdf, CUPS, Poppler: Multiple vulnerabilities

Also available in: Atom

Thank you!