Copied from
ubuntu trusty in
Private PPA for Ubuntu Security Team
by Ubuntu Archive Robot
Changelog
minissdpd (1.1.20120121-1+deb7u1build0.14.04.1) trusty-security; urgency=medium
* fake sync from Debian
minissdpd (1.1.20120121-1+deb7u1) wheezy-security; urgency=high
* Non-maintainer upload by the Wheezy LTS Team.
* patch for CVE-2016-3178 + CVE-2016-3179
The minissdpd daemon contains a improper validation of array index
vulnerability (CWE-129) when processing requests sent to the Unix
socket at /var/run/minissdpd.sock the Unix socket can be accessed
by an unprivileged user to send invalid request causes an
out-of-bounds memory access that crashes the minissdpd daemon.
-- Tyler Hicks <email address hidden> Fri, 01 Jul 2016 13:36:35 -0500