An issue was discovered in NTPsec before 1.1.3. processcontrol() in ntpcontrol.c has a stack-based buffer over-read because attacker-controlled data is dereferenced by ntohl() in ntpd.
{
"binaries": [
{
"binary_name": "ntpsec",
"binary_version": "1.1.0+dfsg1-1ubuntu0.2"
},
{
"binary_name": "ntpsec-ntpdate",
"binary_version": "1.1.0+dfsg1-1ubuntu0.2"
},
{
"binary_name": "ntpsec-ntpviz",
"binary_version": "1.1.0+dfsg1-1ubuntu0.2"
},
{
"binary_name": "python3-ntp",
"binary_version": "1.1.0+dfsg1-1ubuntu0.2"
}
],
"availability": "No subscription required"
}