From eefcc3d71f06c2c2fd754ab29e957e2a3054ede0 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Lo=C3=AFc=20Hoguin?= Date: Thu, 18 Apr 2019 14:12:15 +0200 Subject: OTP-21.3.6 --- release-notes/OTP-21.3.6.README.txt | 41 +++++++++++++++++++++++++++++++++++++ 1 file changed, 41 insertions(+) create mode 100644 release-notes/OTP-21.3.6.README.txt (limited to 'release-notes') diff --git a/release-notes/OTP-21.3.6.README.txt b/release-notes/OTP-21.3.6.README.txt new file mode 100644 index 0000000..e96a974 --- /dev/null +++ b/release-notes/OTP-21.3.6.README.txt @@ -0,0 +1,41 @@ +Patch Package: OTP 21.3.6 +Git Tag: OTP-21.3.6 +Date: 2019-04-18 +Trouble Report Id: OTP-15054 +Seq num: ERIERL-346 +System: OTP +Release: 21 +Application: ssl-9.2.2 +Predecessor: OTP 21.3.5 + + Check out the git tag OTP-21.3.6, and build a full OTP system + including documentation. Apply one or more applications from this + build as patches to your installation using the 'otp_patch_apply' + tool. For information on install requirements, see descriptions for + each application version below. + + --------------------------------------------------------------------- + --- ssl-9.2.2 ------------------------------------------------------- + --------------------------------------------------------------------- + + The ssl-9.2.2 application can be applied independently of other + applications on a full OTP 21 installation. + + --- Fixed Bugs and Malfunctions --- + + OTP-15054 Application(s): ssl + Related Id(s): ERIERL-346 + + With the default BEAST Mitigation strategy for TLS 1.0 + an empty TLS fragment could be sent after a one-byte + fragment. This glitch has been fixed. + + + Full runtime dependencies of ssl-9.2.2: crypto-4.2, erts-10.0, + inets-5.10.7, kernel-6.0, public_key-1.5, stdlib-3.5 + + + --------------------------------------------------------------------- + --------------------------------------------------------------------- + --------------------------------------------------------------------- + -- cgit v1.2.3