Integer overflow in the SampleTable::setSampleToChunkParams function in SampleTable.cpp in libstagefright in Android before 5.1.1 LMY48I allows remote attackers to execute arbitrary code via crafted atoms in MP4 data that trigger an unchecked multiplication, aka internal bug 20139950, a related issue to CVE-2015-4496.
packetstormsecurity.com/files/134131/Libstagefright-Integer-Overflow-Check-Bypass.html
www.huawei.com/en/psirt/security-advisories/hw-448928
www.securityfocus.com/bid/76052
www.securitytracker.com/id/1033094
www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-448928.htm
android.googlesource.com/platform/frameworks/av/+/2434839bbd168469f80dd9a22f1328bc81046398
groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ
www.exploit-db.com/exploits/38124/