~ubuntu-security/ubuntu-cve-tracker/master

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
Candidate: CVE-2015-3864
PublicDate: 2015-09-30
References:
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3864
 https://groups.google.com/forum/message/raw?msg=android-security-updates/1M7qbSvACjo/Y7jewiW1AwAJ
 https://android.googlesource.com/platform/frameworks/av/+/6fe85f7e15203e48df2cc3e8e1c4bc6ad49dc968
Description:
 Integer underflow in the MPEG4Extractor::parseChunk function in
 MPEG4Extractor.cpp in libstagefright in mediaserver in Android before 5.1.1
 LMY48M allows remote attackers to execute arbitrary code via crafted MPEG-4
 data, aka internal bug 23034759.  NOTE: this vulnerability exists because
 of an incomplete fix for CVE-2015-3824.
Ubuntu-Description:
Notes:
 jdstrand> as with previous stagefright issues, this issue affects Ubuntu's
  android packages, but not in a way that is exposed to apps.  See
  CVE-2015-1538 for details
Bugs:
Priority: negligible
Discovered-by:
Assigned-to:

Tags_android: apparmor
Patches_android:
upstream_android: needs-triage
precise_android: DNE
trusty_android: ignored
vivid_android: ignored
vivid/stable-phone-overlay_android: ignored
vivid/ubuntu-core_android: DNE
wily_android: ignored
devel_android: ignored