An issue was discovered in NTPsec before 1.1.3. processcontrol() in ntpcontrol.c has a stack-based buffer over-read because attacker-controlled data is dereferenced by ntohl() in ntpd.
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "1.1.0+dfsg1-1ubuntu0.2",
"binary_name": "ntpsec"
},
{
"binary_version": "1.1.0+dfsg1-1ubuntu0.2",
"binary_name": "ntpsec-ntpdate"
},
{
"binary_version": "1.1.0+dfsg1-1ubuntu0.2",
"binary_name": "ntpsec-ntpviz"
},
{
"binary_version": "1.1.0+dfsg1-1ubuntu0.2",
"binary_name": "python3-ntp"
}
]
}