An issue was discovered in NTPsec before 1.1.3. processcontrol() in ntpcontrol.c has a stack-based buffer over-read because attacker-controlled data is dereferenced by ntohl() in ntpd.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1.1.0+dfsg1-1ubuntu0.2", "binary_name": "ntpsec" }, { "binary_version": "1.1.0+dfsg1-1ubuntu0.2", "binary_name": "ntpsec-dbgsym" }, { "binary_version": "1.1.0+dfsg1-1ubuntu0.2", "binary_name": "ntpsec-doc" }, { "binary_version": "1.1.0+dfsg1-1ubuntu0.2", "binary_name": "ntpsec-ntpdate" }, { "binary_version": "1.1.0+dfsg1-1ubuntu0.2", "binary_name": "ntpsec-ntpviz" }, { "binary_version": "1.1.0+dfsg1-1ubuntu0.2", "binary_name": "python3-ntp" }, { "binary_version": "1.1.0+dfsg1-1ubuntu0.2", "binary_name": "python3-ntp-dbgsym" } ] }