It looks like this was fixed upstream earlier this year in this commit:

https://gitlab.com/NTPsec/ntpsec/-/commit/9931ebb3d1418b648f80510a86520a4d11bab3d6

The relevant bit is the change to ctl_putarray() to set buffer[0] = 0;

It does not appear that this fix has appeared in a release yet.

Exposing stack garbage like this runs the hard-to-quantify risk that keying material could be exposed over the network.

See also https://gitlab.com/NTPsec/ntpsec/-/issues/806 which is another manifestation of this bug (depending on the stack garbage, it can cause other ntpq subcommands to fail).

Reply via email to