Blame SOURCES/ntp-4.2.6p5-sourceport.patch

6e16f6
diff -up ntp-4.2.6p5/ntpd/ntp_proto.c.sourceport ntp-4.2.6p5/ntpd/ntp_proto.c
6e16f6
--- ntp-4.2.6p5/ntpd/ntp_proto.c.sourceport	2015-02-06 16:43:27.857879763 +0100
6e16f6
+++ ntp-4.2.6p5/ntpd/ntp_proto.c	2015-02-06 16:43:56.446879712 +0100
6e16f6
@@ -334,7 +334,7 @@ receive(
6e16f6
 	 * reveals a clogging attack.
6e16f6
 	 */
6e16f6
 	sys_received++;
6e16f6
-	if (SRCPORT(&rbufp->recv_srcadr) < NTP_PORT) {
6e16f6
+	if (SRCPORT(&rbufp->recv_srcadr) == 0) {
6e16f6
 		sys_badlength++;
6e16f6
 		return;				/* bogus port */
6e16f6
 	}