mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-12-12 08:43:06 +00:00
19916860db
The package already has some known vulnerabilities. I'm adding the new ones mostly to save future me some time so I do not have to ask myself if this long list on unpatched issues is expected or not. Upstream expects to to fix all of that in xpdf 5.
105 lines
3.4 KiB
Nix
105 lines
3.4 KiB
Nix
{ enableGUI ? true
|
|
, enablePDFtoPPM ? true
|
|
, enablePrinting ? true
|
|
, lib, stdenv, fetchzip, cmake, makeDesktopItem
|
|
, zlib, libpng, cups ? null, freetype ? null
|
|
, qtbase ? null, qtsvg ? null, wrapQtAppsHook
|
|
}:
|
|
|
|
assert enableGUI -> qtbase != null && qtsvg != null && freetype != null;
|
|
assert enablePDFtoPPM -> freetype != null;
|
|
assert enablePrinting -> cups != null;
|
|
|
|
stdenv.mkDerivation rec {
|
|
pname = "xpdf";
|
|
version = "4.04";
|
|
|
|
src = fetchzip {
|
|
url = "https://dl.xpdfreader.com/xpdf-${version}.tar.gz";
|
|
hash = "sha256-ujH9KDwFRjPIKwdMg79Mab9BfA2HooY5+2PESUgnGDY=";
|
|
};
|
|
|
|
# Fix "No known features for CXX compiler", see
|
|
# https://cmake.org/pipermail/cmake/2016-December/064733.html and the note at
|
|
# https://cmake.org/cmake/help/v3.10/command/cmake_minimum_required.html
|
|
postPatch = lib.optionalString stdenv.isDarwin ''
|
|
substituteInPlace CMakeLists.txt --replace \
|
|
'cmake_minimum_required(VERSION 2.8.12)' 'cmake_minimum_required(VERSION 3.1.0)'
|
|
'';
|
|
|
|
nativeBuildInputs =
|
|
[ cmake ]
|
|
++ lib.optional enableGUI wrapQtAppsHook;
|
|
|
|
cmakeFlags = ["-DSYSTEM_XPDFRC=/etc/xpdfrc" "-DA4_PAPER=ON" "-DOPI_SUPPORT=ON"]
|
|
++ lib.optional (!enablePrinting) "-DXPDFWIDGET_PRINTING=OFF";
|
|
|
|
buildInputs = [ zlib libpng ] ++
|
|
lib.optional enableGUI qtbase ++
|
|
lib.optional enablePrinting cups ++
|
|
lib.optional enablePDFtoPPM freetype;
|
|
|
|
desktopItem = makeDesktopItem {
|
|
name = "xpdf";
|
|
desktopName = "Xpdf";
|
|
comment = "Views Adobe PDF files";
|
|
icon = "xpdf";
|
|
exec = "xpdf %f";
|
|
categories = [ "Office" ];
|
|
};
|
|
|
|
postInstall = lib.optionalString (!stdenv.isDarwin) ''
|
|
install -Dm644 ${desktopItem}/share/applications/xpdf.desktop -t $out/share/applications
|
|
install -Dm644 $src/xpdf-qt/xpdf-icon.svg $out/share/pixmaps/xpdf.svg
|
|
'';
|
|
|
|
meta = with lib; {
|
|
homepage = "https://www.xpdfreader.com";
|
|
description = "Viewer for Portable Document Format (PDF) files";
|
|
longDescription = ''
|
|
XPDF includes multiple tools for viewing and processing PDF files.
|
|
xpdf: PDF viewer (with Graphical Interface)
|
|
pdftotext: converts PDF to text
|
|
pdftops: converts PDF to PostScript
|
|
pdftoppm: converts PDF pages to netpbm (PPM/PGM/PBM) image files
|
|
pdftopng: converts PDF pages to PNG image files
|
|
pdftohtml: converts PDF to HTML
|
|
pdfinfo: extracts PDF metadata
|
|
pdfimages: extracts raw images from PDF files
|
|
pdffonts: lists fonts used in PDF files
|
|
pdfdetach: extracts attached files from PDF files
|
|
'';
|
|
license = with licenses; [ gpl2Only gpl3Only ];
|
|
platforms = platforms.unix;
|
|
maintainers = with maintainers; [ sikmir ];
|
|
knownVulnerabilities = [
|
|
"CVE-2018-7453: loop in PDF objects"
|
|
"CVE-2018-16369: loop in PDF objects"
|
|
"CVE-2019-9587: loop in PDF objects"
|
|
"CVE-2019-9588: loop in PDF objects"
|
|
"CVE-2019-16088: loop in PDF objects"
|
|
"CVE-2022-38334"
|
|
"CVE-2022-38928"
|
|
"CVE-2022-41842"
|
|
"CVE-2022-41843"
|
|
"CVE-2022-41844"
|
|
"CVE-2022-43071"
|
|
"CVE-2022-43295"
|
|
"CVE-2022-45586"
|
|
"CVE-2022-45587"
|
|
"CVE-2023-2662"
|
|
"CVE-2023-2663"
|
|
"CVE-2023-2664"
|
|
"CVE-2023-26930"
|
|
"CVE-2023-26931"
|
|
"CVE-2023-26934"
|
|
"CVE-2023-26935"
|
|
"CVE-2023-26936"
|
|
"CVE-2023-26937"
|
|
"CVE-2023-26938"
|
|
"CVE-2023-27655"
|
|
"CVE-2023-31557"
|
|
];
|
|
};
|
|
}
|