CVE-2015-3873
Publication date 6 October 2015
Last updated 24 July 2024
Ubuntu priority
Description
libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bugs 23016072, 23248776, 23247055, 22845824, 22008959, 21814993, 21048776, 20718524, 20674674, 22388975, 20674086, 21443020, and 22077698, a different vulnerability than CVE-2015-7716.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| android | ||
| 14.04 LTS trusty | Not in release | |
Notes
jdstrand
as with previous stagefright issues, this issue affects Ubuntu's android packages, but not in a way that is exposed to apps. See CVE-2015-1538 for details
References
Other references
- https://groups.google.com/forum/#!topic/android-security-updates/iv1BF0f0XY4
- https://android.googlesource.com/platform/frameworks/av/+/c23e3dd8af7397f023aae040c4a03dd14091cbed%5E!/#F0
- https://android.googlesource.com/platform/frameworks/av/+/9abb7401df730b5c510f6b8dac2716a0928d9623%5E!/#F0
- https://android.googlesource.com/platform/frameworks/av/+/b62a73b860757143d3b140b2985fdae71e18d675%5E!/#F0
- https://android.googlesource.com/platform/frameworks/av/+/b2ae4351539de9aa4667fcb3e02ba40d9c6bd094%5E!/#F0
- https://android.googlesource.com/platform/frameworks/av/+/3fd96683850cf27648e036180acb149fac362242%5E!/#F0
- https://android.googlesource.com/platform/frameworks/av/+/38eff9af5c032bf12f89d6e94df05f65eef51afc%5E!/#F0
- https://android.googlesource.com/platform/frameworks/av/+/91860b89488b3ee4644c539e89e657fbb79fb6ad%5E!/#F0
- https://android.googlesource.com/platform/external/tremolo/+/2e941e40ce76eb13b273479a4ee8fb6e40d33795%5E!/#F0
- https://android.googlesource.com/platform/external/tremolo/+/06ca06ac6107f88530cc67225c47537621bb41a5%5E!/#F0
- https://android.googlesource.com/platform/frameworks/av/+/dc5e47f013bfbb74c5c35ad976aa98d480cb351b%5E!/#F0
- https://android.googlesource.com/platform/frameworks/av/+/f11e95b21007f24e5ab77298370855f9f085b2d7%5E!/#F0
- https://android.googlesource.com/platform/frameworks/av/+/f810a8298aea13fa177060cdc10c8297eac69c49%5E!/#F0
- https://android.googlesource.com/platform/frameworks/av/+/7913508110c80da87fb085514208adbd874d7d54%5E!/#F0
- https://android.googlesource.com/platform/frameworks/av/+/073e4f6748f5d7deb095c42fad9271cb99e22d07%5E!/#F0
- https://android.googlesource.com/platform/frameworks/av/+/bf47eb9c67ed364f3c288954857aab9d9311db4c%5E!/#F0
- https://android.googlesource.com/platform/frameworks/av/+/b158a9a5bcfe21480f57bc58d45517f1a81cca39%5E!/#F0
- https://android.googlesource.com/platform/frameworks/av/+/5a132594b531f1f48098a790927f82080cc27f61%5E!/#F0
- https://android.googlesource.com/platform/frameworks/av/+/d2ebc0b9e147f9406db20ec4df61da50e3614ee4%5E!/#F0
- https://android.googlesource.com/platform/frameworks/av/+/3179e3b3531b5fe93dc7f5b2c378e27010a406d5%5E!/#F0
- https://www.cve.org/CVERecord?id=CVE-2015-3873