android, mpeg2dec
2018-01-15 14:55
2017-10-23 14:29
2017-09-19 19:06
2017-07-20 21:34
2017-06-16 19:21
2017-06-15 17:14
2017-05-12 22:03


A remote code execution vulnerability in libmpeg2 in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-35219737.

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information



Release Package Reason
precise/esm android DNE
mpeg2dec DNE
vivid/stable-phone-overlay android ignored
mpeg2dec DNE
vivid/ubuntu-core android DNE
mpeg2dec DNE
yakkety android ignored
mpeg2dec ignored
zesty android ignored
mpeg2dec ignored
artful android DNE
devel android DNE

Needs Triage

Release Package Reason
upstream android needs-triage
mpeg2dec needs-triage
trusty android needs-triage
mpeg2dec needs-triage
xenial android needs-triage
mpeg2dec needs-triage
artful mpeg2dec needs-triage
devel mpeg2dec needs-triage