It looks like this was fixed upstream earlier this year in this commit:
https://gitlab.com/NTPsec/ntpsec/-/commit/9931ebb3d1418b648f80510a86520a4d11bab3d6
The relevant bit is the change to ctl_putarray() to set buffer[0] = 0;
It does not appear that this fix has appeared in a release yet.
Expo
Package: ntpsec
Version: 1.2.2+dfsg1-1+deb12u1
Severity: important
Dear Maintainer,
It appears that ntpsec's ntpd returns corrupted values in the "filtdelay",
"filtoffset" and "filtdisp" peer variables visible via ntpq.
reproducer:
$ ntpq
ntpq> peers
(output elided)
ntpq> rv &1 filtdelay f
On Sat, 2005-12-31 at 11:05, Colin Watson wrote:
> Recent versions of the Linux kernel support an IUTF8 flag (see
> http://www.cl.cam.ac.uk/~mgk25/unicode.html#mod) which allows the
> character-erase function in cooked mode to handle UTF-8 characters
> correctly. I would like to allow this mode to
3 matches
Mail list logo