CTS tests for CVE-2017-0811

raw hevc input file that trips the security vulnerability.
and the invocation of doStagefrightTestRawBlob() to try it.

Bug: 37930177
Test: run CTS before/after applying the security patch
Change-Id: Id6ce2b0ff111a0177efd2f85c5902a5fae121d86
diff --git a/tests/tests/security/res/raw/bug_37930177_hevc.mp4 b/tests/tests/security/res/raw/bug_37930177_hevc.mp4
new file mode 100644
index 0000000..28b6699
--- /dev/null
+++ b/tests/tests/security/res/raw/bug_37930177_hevc.mp4
Binary files differ
diff --git a/tests/tests/security/src/android/security/cts/StagefrightTest.java b/tests/tests/security/src/android/security/cts/StagefrightTest.java
index d6d20ec..0c943e5f 100644
--- a/tests/tests/security/src/android/security/cts/StagefrightTest.java
+++ b/tests/tests/security/src/android/security/cts/StagefrightTest.java
@@ -662,6 +662,11 @@
         doStagefrightTestRawBlob(R.raw.bug_36895511, "video/hevc", 320, 240);
     }
 
+    @SecurityTest
+    public void testBug_37930177() throws Exception {
+        doStagefrightTestRawBlob(R.raw.bug_37930177_hevc, "video/hevc", 320, 240);
+    }
+
     private void runWithTimeout(Runnable runner, int timeout) {
         Thread t = new Thread(runner);
         t.start();