aboutsummaryrefslogtreecommitdiffstats
path: root/release-notes/OTP-23.3.4.5.README.txt
blob: 946e220b1ca519c6e7734a6fed0384909033c249 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
Patch Package:           OTP 23.3.4.5
Git Tag:                 OTP-23.3.4.5
Date:                    2021-07-22
Trouble Report Id:       OTP-17150, OTP-17475, OTP-17493, OTP-17500,
                         OTP-17506, OTP-17509, OTP-17513, OTP-17522,
                         OTP-17525, OTP-17529
Seq num:                 GH-4809, GH-4877, GH-4902, GH-4958, GH-4964,
                         GH-5053
System:                  OTP
Release:                 23
Application:             asn1-5.0.15.1, common_test-1.20.2.2,
                         erts-11.2.2.4, public_key-1.10.0.1,
                         ssl-10.3.1.2, stdlib-3.14.2.2
Predecessor:             OTP 23.3.4.4

 Check out the git tag OTP-23.3.4.5, and build a full OTP system
 including documentation. Apply one or more applications from this
 build as patches to your installation using the 'otp_patch_apply'
 tool. For information on install requirements, see descriptions for
 each application version below.

 ---------------------------------------------------------------------
 --- asn1-5.0.15.1 ---------------------------------------------------
 ---------------------------------------------------------------------

 The asn1-5.0.15.1 application can be applied independently of other
 applications on a full OTP 23 installation.

 --- Fixed Bugs and Malfunctions ---

  OTP-17522    Application(s): asn1
               Related Id(s): GH-4902

               A parameterized type with a SEQUENCE with extension
               ("...") made the compiler backend to crash. The
               previous fix for this in GH-4514 was not complete.


 Full runtime dependencies of asn1-5.0.15.1: erts-7.0, kernel-3.0,
 stdlib-2.0


 ---------------------------------------------------------------------
 --- common_test-1.20.2.2 --------------------------------------------
 ---------------------------------------------------------------------

 The common_test-1.20.2.2 application can be applied independently of
 other applications on a full OTP 23 installation.

 --- Fixed Bugs and Malfunctions ---

  OTP-17506    Application(s): common_test

               An incoming NETCONF notification received before a call
               to ct_netconfc:create_subscription/* caused the
               connection process to fail with badarg. Unexpected
               notifications are now logged in the same way as other
               unexpected messages.


 --- Improvements and New Features ---

  OTP-17509    Application(s): common_test

               Add 'receiver' option to ct_netconfc

               To allow a destination for incoming NETCONF
               notifications to be specified at sessions creation.
               Previously, a caller of create_subscription/* became
               the destination, but RFC 5277 create-subscription is no
               longer the only way in which NETCONF notifications can
               be ordered.


 Full runtime dependencies of common_test-1.20.2.2: compiler-6.0,
 crypto-3.6, debugger-4.1, erts-7.0, ftp-1.0.0, inets-6.0, kernel-4.0,
 observer-2.1, runtime_tools-1.8.16, sasl-2.4.2, snmp-5.1.2, ssh-4.0,
 stdlib-3.5, syntax_tools-1.7, tools-2.8, xmerl-1.3.8


 ---------------------------------------------------------------------
 --- erts-11.2.2.4 ---------------------------------------------------
 ---------------------------------------------------------------------

 The erts-11.2.2.4 application can be applied independently of other
 applications on a full OTP 23 installation.

 --- Fixed Bugs and Malfunctions ---

  OTP-17493    Application(s): erts

               Microstate accounting (msacc) and os:perf_counter()
               unintentionally used system time instead of monotonic
               time for time measurements on a lot of systems. These
               systems were all non x86/x86_64 systems or x86/x86_64
               systems without a reliable and constant rdtsc
               instruction.

               The lock counting (lcnt) built runtime system also
               unintentionally used system time instead of monotonic
               time for time measurements on all systems.


  OTP-17500    Application(s): erts
               Related Id(s): GH-4809

               Simultaneous calls to
               erlang:system_flag(schedulers_online, _) could cause
               callers to end up in a suspended state forever.


  OTP-17513    Application(s): erts
               Related Id(s): GH-4964, PR-5015

               Fix rare race bug in memory management of distribution
               entries. Have been seen to cause VM crash when massive
               number of repeated concurrent failing connection
               attempts.


 Full runtime dependencies of erts-11.2.2.4: kernel-7.0, sasl-3.3,
 stdlib-3.13


 ---------------------------------------------------------------------
 --- public_key-1.10.0.1 ---------------------------------------------
 ---------------------------------------------------------------------

 The public_key-1.10.0.1 application can be applied independently of
 other applications on a full OTP 23 installation.

 --- Fixed Bugs and Malfunctions ---

  OTP-17475    Application(s): public_key, ssl
               Related Id(s): GH-4877

               Handle cross-signed root certificates when old root
               expired as reported in GH-4877.


 Full runtime dependencies of public_key-1.10.0.1: asn1-3.0,
 crypto-3.8, erts-6.0, kernel-3.0, stdlib-3.5


 ---------------------------------------------------------------------
 --- ssl-10.3.1.2 ----------------------------------------------------
 ---------------------------------------------------------------------

 Note! The ssl-10.3.1.2 application *cannot* be applied independently
       of other applications on an arbitrary OTP 23 installation.

       On a full OTP 23 installation, also the following runtime
       dependency has to be satisfied:
       -- public_key-1.10.0.1 (first satisfied in OTP 23.3.4.5)


 --- Fixed Bugs and Malfunctions ---

  OTP-17475    Application(s): public_key, ssl
               Related Id(s): GH-4877

               Handle cross-signed root certificates when old root
               expired as reported in GH-4877.


  OTP-17529    Application(s): ssl
               Related Id(s): GH-4958, PR-4979

               The signature selection algorithm has been changed to
               also verify if the client supports signatures using the
               elliptic curve of the server's public/private key pair.
               This change fixes #4958.


 --- Improvements and New Features ---

  OTP-17150    Application(s): ssl
               Related Id(s): GH-4877

               Slight optimization of certificate decoding.


 Full runtime dependencies of ssl-10.3.1.2: crypto-4.2, erts-10.0,
 inets-5.10.7, kernel-6.0, public_key-1.10.0.1, stdlib-3.12


 ---------------------------------------------------------------------
 --- stdlib-3.14.2.2 -------------------------------------------------
 ---------------------------------------------------------------------

 The stdlib-3.14.2.2 application can be applied independently of other
 applications on a full OTP 23 installation.

 --- Fixed Bugs and Malfunctions ---

  OTP-17525    Application(s): stdlib
               Related Id(s): GH-5053

               Fix a bug that could cause a crash when formatting
               tuples using the control sequences p or P and limiting
               the output with the option chars_limit.


 Full runtime dependencies of stdlib-3.14.2.2: compiler-5.0,
 crypto-3.3, erts-11.0, kernel-7.0, sasl-3.0


 ---------------------------------------------------------------------
 ---------------------------------------------------------------------
 ---------------------------------------------------------------------