pkg/report: double-free is at least as severe as UAF write #6691
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Double-free is at least as severe as a UAF write because in case of UAF write, the vulnerable object is given and you have to find the right victim object - the writable offset and size needs to match.
In case of double-free you can choose both your victim and attacker object, giving more options for a successful exploitation (there are attacker objects which can basically write all offset and sizes).
This assumes that double-free is controlled in a way that the attacker can spray a victim object between the two
kfree()s.