This means that you get a lot of functionality that is not 'mature' enough or is otherwise inappropriate for the official JtR, which in turn also means that bugs in this code are to be expected. It is very easy for new code to be added to jumbo: the quality requirements are low.
This is not 'official' John the Ripper code. It has a lot of code, documentation, and data contributed by the user community. We will need to work with the Jumbo version of JohnTheRipper. This is a community-enhanced, 'jumbo' version of John the Ripper. In this article we will explain you how to try to crack a PDF with password using a brute-force attack with JohnTheRipper. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos/AFS and Windows LM hashes, as well as DES-based tripcodes, plus hundreds of additional hashes and ciphers in '-jumbo' versions. Its primary purpose is to detect weak Unix passwords. John the Ripper is a fast password cracker, currently available for many flavors of Unix, macOS, Windows, DOS, BeOS, and OpenVMS (the latter requires a contributed patch).