Update for 18.26.4

This commit is contained in:
Asterisk Development Team
2025-08-28 14:58:07 +00:00
parent e214f5c81b
commit c576a69f17
6 changed files with 110 additions and 4 deletions

View File

@@ -1 +1 @@
18.26.3 18.26.4

View File

@@ -1 +1 @@
ChangeLogs/ChangeLog-18.26.3.html ChangeLogs/ChangeLog-18.26.4.html

View File

@@ -1 +1 @@
ChangeLogs/ChangeLog-18.26.3.md ChangeLogs/ChangeLog-18.26.4.md

View File

@@ -0,0 +1,48 @@
<html><head><title>ChangeLog for asterisk-18.26.4</title></head><body>
<h2>Change Log for Release asterisk-18.26.4</h2>
<h3>Links:</h3>
<ul>
<li><a href="https://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-18.26.4.html">Full ChangeLog</a> </li>
<li><a href="https://github.com/asterisk/asterisk/compare/18.26.3...18.26.4">GitHub Diff</a> </li>
<li><a href="https://downloads.asterisk.org/pub/telephony/asterisk/asterisk-18.26.4.tar.gz">Tarball</a> </li>
<li><a href="https://downloads.asterisk.org/pub/telephony/asterisk">Downloads</a> </li>
</ul>
<h3>Summary:</h3>
<ul>
<li>Commits: 1</li>
<li>Commit Authors: 1</li>
<li>Issues Resolved: 0</li>
<li>Security Advisories Resolved: 1</li>
<li><a href="https://github.com/asterisk/asterisk/security/advisories/GHSA-557q-795j-wfx2">GHSA-557q-795j-wfx2</a>: Resource exhaustion (DoS) vulnerability: remotely exploitable leak of RTP UDP ports and internal resources</li>
</ul>
<h3>User Notes:</h3>
<h3>Upgrade Notes:</h3>
<h3>Developer Notes:</h3>
<h3>Commit Authors:</h3>
<ul>
<li>George Joseph: (1)</li>
</ul>
<h2>Issue and Commit Detail:</h2>
<h3>Closed Issues:</h3>
<ul>
<li>!GHSA-557q-795j-wfx2: Resource exhaustion (DoS) vulnerability: remotely exploitable leak of RTP UDP ports and internal resources</li>
</ul>
<h3>Commits By Author:</h3>
<ul>
<li>
<h4>George Joseph (1):</h4>
</li>
<li>pjproject: Update bundled to 2.15.1.</li>
</ul>
<h3>Commit List:</h3>
<ul>
<li>pjproject: Update bundled to 2.15.1.</li>
</ul>
<h3>Commit Details:</h3>
<h4>pjproject: Update bundled to 2.15.1.</h4>
<p>Author: George Joseph
Date: 2025-08-25</p>
<p>This resolves a security issue where RTP ports weren't being released
causing possible resource exhaustion issues.</p>
<p>Resolves: #GHSA-557q-795j-wfx2</p>
</body></html>

View File

@@ -0,0 +1,58 @@
## Change Log for Release asterisk-18.26.4
### Links:
- [Full ChangeLog](https://downloads.asterisk.org/pub/telephony/asterisk/releases/ChangeLog-18.26.4.html)
- [GitHub Diff](https://github.com/asterisk/asterisk/compare/18.26.3...18.26.4)
- [Tarball](https://downloads.asterisk.org/pub/telephony/asterisk/asterisk-18.26.4.tar.gz)
- [Downloads](https://downloads.asterisk.org/pub/telephony/asterisk)
### Summary:
- Commits: 1
- Commit Authors: 1
- Issues Resolved: 0
- Security Advisories Resolved: 1
- [GHSA-557q-795j-wfx2](https://github.com/asterisk/asterisk/security/advisories/GHSA-557q-795j-wfx2): Resource exhaustion (DoS) vulnerability: remotely exploitable leak of RTP UDP ports and internal resources
### User Notes:
### Upgrade Notes:
### Developer Notes:
### Commit Authors:
- George Joseph: (1)
## Issue and Commit Detail:
### Closed Issues:
- !GHSA-557q-795j-wfx2: Resource exhaustion (DoS) vulnerability: remotely exploitable leak of RTP UDP ports and internal resources
### Commits By Author:
- #### George Joseph (1):
- pjproject: Update bundled to 2.15.1.
### Commit List:
- pjproject: Update bundled to 2.15.1.
### Commit Details:
#### pjproject: Update bundled to 2.15.1.
Author: George Joseph
Date: 2025-08-25
This resolves a security issue where RTP ports weren't being released
causing possible resource exhaustion issues.
Resolves: #GHSA-557q-795j-wfx2

View File

@@ -1,4 +1,4 @@
<html><head><title>Readme for asterisk-18.26.3</title></head><body> <html><head><title>Readme for asterisk-18.26.4</title></head><body>
<h1>The Asterisk(R) Open Source PBX</h1> <h1>The Asterisk(R) Open Source PBX</h1>
<pre><code class="language-text"> By Mark Spencer &lt;markster@digium.com&gt; and the Asterisk.org developer community. <pre><code class="language-text"> By Mark Spencer &lt;markster@digium.com&gt; and the Asterisk.org developer community.
Copyright (C) 2001-2021 Sangoma Technologies Corporation and other copyright holders. Copyright (C) 2001-2021 Sangoma Technologies Corporation and other copyright holders.