A flaw was discovered in Asterisk 15.x. When reading a websocket, the length was not being checked. If a payload of length 0 was read, it would result in a busy loop that waited for the underlying connection to close. References: http://downloads.asterisk.org/pub/security/AST-2018-006.html https://issues.asterisk.org/jira/browse/ASTERISK-27658 Patch: http://downloads.asterisk.org/pub/security/AST-2018-006-15.diff
Created asterisk tracking bugs for this issue: Affects: epel-6 [bug 1548151] Affects: fedora-all [bug 1548150]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.