
Cloud Vulnerability DB
A community-led vulnerabilities database
Tesseract OCR version 5.0.0-alpha-20201231 contains a use-after-free vulnerability during a strpbrk call in the oneellconflict function. The vulnerability was discovered and disclosed on July 1, 2021 (CVE MITRE, NVD).
The vulnerability is classified as a heap-use-after-free READ 2 issue that occurs in the _libcppstrpbrk function, specifically within the tesseract::Tesseract::oneellconflict execution path. The issue was identified through OSS-Fuzz testing and has been assigned a HIGH severity rating (OSS Fuzz).
The vulnerability could potentially lead to memory corruption and program crashes when exploited. Given its classification as a use-after-free vulnerability, it could potentially be exploited to read sensitive information from freed memory locations (Debian Tracker).
The vulnerability has been fixed in multiple versions of Tesseract OCR. Fixed versions include 5.1.0-1 and later. Users are advised to upgrade to the patched versions. The fix was implemented through commit e6f15621c2ab2ecbfabf656942d8ef66f03b2d55 (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."