CTS test for Android Security b/28556125 b/72507692

Test: successful run of newly introduced CTS test case.
Bug: 28556125
Bug: 72507692

Change-Id: I9d483252b628cd048962a38171f368b884f47b85
(cherry picked from commit 1bd86c786926b286188fca4e62f243ab2dc6b482)
Signed-off-by: Pradeep Chenthati <pchenthati@google.com>
diff --git a/tests/tests/security/res/raw/cve_2016_3756.ogg b/tests/tests/security/res/raw/cve_2016_3756.ogg
new file mode 100644
index 0000000..4f366b0
--- /dev/null
+++ b/tests/tests/security/res/raw/cve_2016_3756.ogg
Binary files differ
diff --git a/tests/tests/security/src/android/security/cts/StagefrightTest.java b/tests/tests/security/src/android/security/cts/StagefrightTest.java
index f9f95ef..de04924 100755
--- a/tests/tests/security/src/android/security/cts/StagefrightTest.java
+++ b/tests/tests/security/src/android/security/cts/StagefrightTest.java
@@ -603,6 +603,11 @@
     }
 
     @SecurityTest
+    public void testStagefright_cve_2016_3756() throws Exception {
+        doStagefrightTest(R.raw.cve_2016_3756);
+    }
+
+    @SecurityTest
     public void testStagefright_bug_36592202() throws Exception {
         Resources resources = getInstrumentation().getContext().getResources();
         AssetFileDescriptor fd = resources.openRawResourceFd(R.raw.bug_36592202);