Blame SOURCES/ntp-4.2.6p5-sourceport.patch

2b78f7
diff -up ntp-4.2.6p5/ntpd/ntp_proto.c.sourceport ntp-4.2.6p5/ntpd/ntp_proto.c
2b78f7
--- ntp-4.2.6p5/ntpd/ntp_proto.c.sourceport	2015-02-06 16:43:27.857879763 +0100
2b78f7
+++ ntp-4.2.6p5/ntpd/ntp_proto.c	2015-02-06 16:43:56.446879712 +0100
2b78f7
@@ -334,7 +334,7 @@ receive(
2b78f7
 	 * reveals a clogging attack.
2b78f7
 	 */
2b78f7
 	sys_received++;
2b78f7
-	if (SRCPORT(&rbufp->recv_srcadr) < NTP_PORT) {
2b78f7
+	if (SRCPORT(&rbufp->recv_srcadr) == 0) {
2b78f7
 		sys_badlength++;
2b78f7
 		return;				/* bogus port */
2b78f7
 	}