A remote denial of service flaw was found in the way Corosync, the cluster engine and application programming interfaces, performed processing of network packets. Previously the HMAC key was not initialized properly, which allowed random targeted packets to be processed by the internal process of corosync and possibly leading to a daemon crash.
Relevant upstream patch (might not be complete set):
> Relevant upstream patch (might not be complete set):
complete set is 3 patches.
This issue did NOT affect the version of the corosync package, as shipped with Red Hat Enterprise Linux 6.
Not vulnerable. This issue did not affect the version of corosync as shipped with Red Hat Enterprise Linux 6.
The CVE identifier of CVE-2013-0250 has been assigned to this issue: