
Cloud Vulnerability DB
A community-led vulnerabilities database
An use-after-free vulnerability was discovered in GOCR (GNU Optical Character Recognition) through version 0.53-20200802. The vulnerability specifically affects the context_correction() function in the pgm2asc.c file (CVE Details).
The vulnerability is classified as a use-after-free issue (CWE-416) that occurs in the context_correction() function. The bug manifests in two specific locations within pgm2asc.c: at line 2857:51 and line 2817:39. When triggered, the vulnerability causes the program to attempt to read 4 bytes from previously freed memory regions (SourceForge Bug 40, SourceForge Bug 41).
The vulnerability affects the core functionality of GOCR, which is used for converting scanned images of text back to text files. While the immediate impact appears to be a crash in the CLI tool, the use-after-free condition could potentially lead to more severe consequences in certain contexts (Gentoo Advisory).
As of January 2024, some distributions like Gentoo have discontinued support for GOCR and recommend users uninstall the package using 'emerge --ask --depclean "app-text/gocr"'. No specific patches have been identified for this vulnerability (Gentoo Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."