フルタイトル : Samsung SEND_FILE_WITH_HEADER Use-After-Free Exploit カテゴリ: local exploits プラットフォーム: Android Samsung suffers from a use-after-free vulnerability due to a missing lock in the SEND_FILE_WITH_HEADER handler in f_mtp_samsung.c. # 0day.today @ http://0day.today/