Blame SOURCES/ntp-4.2.6p5-cve-2016-2518.patch

6e16f6
diff -up ntp-4.2.6p5/ntpd/ntp_request.c.cve-2016-2518 ntp-4.2.6p5/ntpd/ntp_request.c
6e16f6
--- ntp-4.2.6p5/ntpd/ntp_request.c.cve-2016-2518	2016-04-29 13:41:22.690006470 +0200
6e16f6
+++ ntp-4.2.6p5/ntpd/ntp_request.c	2016-04-29 13:56:12.039936978 +0200
6e16f6
@@ -1342,7 +1342,6 @@ do_conf(
6e16f6
 	memset(&temp_cp, 0, sizeof(struct conf_peer));
6e16f6
 	memcpy(&temp_cp, (char *)cp, INFO_ITEMSIZE(inpkt->mbz_itemsize));
6e16f6
 
6e16f6
-#if 0 /* paranoid checking - these are done in newpeer() */
6e16f6
 	fl = 0;
6e16f6
 	while (items-- > 0 && !fl) {
6e16f6
 		if (((temp_cp.version) > NTP_VERSION)
6e16f6
@@ -1363,7 +1362,6 @@ do_conf(
6e16f6
 		req_ack(srcadr, inter, inpkt, INFO_ERR_FMT);
6e16f6
 		return;
6e16f6
 	}
6e16f6
-#endif /* end paranoid checking */
6e16f6
 
6e16f6
 	/*
6e16f6
 	 * Looks okay, try it out