1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
|
Patch Package: OTP 26.0.1
Git Tag: OTP-26.0.1
Date: 2023-06-08
Trouble Report Id: OTP-18576, OTP-18578, OTP-18581, OTP-18583,
OTP-18584, OTP-18585, OTP-18587, OTP-18588,
OTP-18593, OTP-18595, OTP-18596, OTP-18597,
OTP-18600, OTP-18601, OTP-18602, OTP-18603,
OTP-18604, OTP-18617, OTP-18619, OTP-18621,
OTP-18632
Seq num: ERIERL-944, GH-7213, GH-7247, GH-7248,
GH-7251, GH-7252, GH-7259, GH-7264, GH-7282,
GH-7288, GH-7297, GH-7301, GH-7303, GH-7338,
GH-7339
System: OTP
Release: 26
Application: compiler-8.3.1, erts-14.0.1, inets-9.0.1,
kernel-9.0.1, ssl-11.0.1, stdlib-5.0.1,
xmerl-1.3.32
Predecessor: OTP 26.0
Check out the git tag OTP-26.0.1, and build a full OTP system
including documentation. Apply one or more applications from this
build as patches to your installation using the 'otp_patch_apply'
tool. For information on install requirements, see descriptions for
each application version below.
---------------------------------------------------------------------
--- compiler-8.3.1 --------------------------------------------------
---------------------------------------------------------------------
The compiler-8.3.1 application can be applied independently of other
applications on a full OTP 26 installation.
--- Fixed Bugs and Malfunctions ---
OTP-18576 Application(s): compiler
Fixed a bug where a failing bsl expression in a guard
threw an exception instead of causing the guard to
fail.
OTP-18581 Application(s): compiler
Related Id(s): GH-7251
Fixed a bug that would case the validator to reject
legal code.
OTP-18583 Application(s): compiler
Related Id(s): GH-7259
The compiler could re-order clauses matching binaries
so that the incorrect clause would match. That could
only happen for code that used the option
{error_location,line} or for code without line or
column number information (e.g. generated by a parse
transform).
OTP-18593 Application(s): compiler
Related Id(s): GH-7252
Complex guard expression using the or operator and
guard BIFs that can fail could sometimes be miscompiled
so that the guard would succeed even if a call to a
guard BIF failed.
OTP-18600 Application(s): compiler
Related Id(s): GH-7248
With optimizations disabled, a try/catch construct
could return an incorrect value.
OTP-18601 Application(s): compiler
In rare circumstance, a combination of binary
construction and binary_part/3 would cause the compiler
to generate unsafe code that would crash the runtime
system.
OTP-18617 Application(s): compiler
Related Id(s): GH-7338
The compiler could be very slow when compiling guards
with multiple guard tests separated with 'or' or ';'.
OTP-18619 Application(s): compiler
Related Id(s): GH-7339
Complex guard expressions using 'or' and map updates
could succeed even if the map update failed.
Full runtime dependencies of compiler-8.3.1: crypto-5.1, erts-13.0,
kernel-8.4, stdlib-5.0
---------------------------------------------------------------------
--- erts-14.0.1 -----------------------------------------------------
---------------------------------------------------------------------
The erts-14.0.1 application can be applied independently of other
applications on a full OTP 26 installation.
--- Fixed Bugs and Malfunctions ---
OTP-18585 Application(s): erts
Related Id(s): OTP-18029
Build of the socket nif failed on Solaris 11.
OTP-18587 Application(s): erts
Fixed two reduction-counting bugs relating to binaries.
OTP-18597 Application(s): erts
Constructing a binary segment not aligned with a byte
boundary, with a size not fitting in 31 bits, and with
a value not fitting in a 64-bit word could crash the
runtime system.
OTP-18602 Application(s): erts
Related Id(s): GH-7282
When a binary construction failed because of bad size
for a segment, the error information was not always
correct.
OTP-18621 Application(s): erts
Related Id(s): GH-7288
Fixed a crash when calling a fun that was defined in a
module that had been upgraded.
Full runtime dependencies of erts-14.0.1: kernel-9.0, sasl-3.3,
stdlib-4.1
---------------------------------------------------------------------
--- inets-9.0.1 -----------------------------------------------------
---------------------------------------------------------------------
The inets-9.0.1 application can be applied independently of other
applications on a full OTP 26 installation.
--- Fixed Bugs and Malfunctions ---
OTP-18604 Application(s): inets
Related Id(s): GH-7303, PR-7306
Do not make the default ssl options by calling
httpc:ssl_verify_host_options(true) if ssl options are
supplied by the user.
Full runtime dependencies of inets-9.0.1: erts-14.0, kernel-9.0,
mnesia-4.12, public_key-1.13, runtime_tools-1.8.14, ssl-9.0,
stdlib-5.0, stdlib-5.0
---------------------------------------------------------------------
--- kernel-9.0.1 ----------------------------------------------------
---------------------------------------------------------------------
The kernel-9.0.1 application can be applied independently of other
applications on a full OTP 26 installation.
--- Fixed Bugs and Malfunctions ---
OTP-18578 Application(s): kernel, stdlib
Related Id(s): GH-7213
The POSIX error exdev was sometimes incorrectly
described as "cross domain link" in some error
messages.
OTP-18584 Application(s): kernel
Related Id(s): #7238
Corrected the socket send function description (send
with Timeout = nowait). The send function(s) could not
return {ok, {RestData, SelectInfo}}
Full runtime dependencies of kernel-9.0.1: crypto-5.0, erts-14.0,
sasl-3.0, stdlib-5.0
---------------------------------------------------------------------
--- ssl-11.0.1 ------------------------------------------------------
---------------------------------------------------------------------
The ssl-11.0.1 application can be applied independently of other
applications on a full OTP 26 installation.
--- Fixed Bugs and Malfunctions ---
OTP-18588 Application(s): ssl
Related Id(s): GH-7264, PR-7277
Make sure that selection of client certificates handle
both TLS-1.3 and TLS-1.2 names correctly. Could cause
valid client certificate to not be selected, and an
empty client certificate message to be sent to server.
OTP-18596 Application(s): ssl
Related Id(s): GH-7247
Improved ssl:format_error/1 to handle more error
tuples.
OTP-18603 Application(s): ssl
Related Id(s): GH-7297
Fixed hanging ssl:connect when ssl application is not
started.
OTP-18632 Application(s): ssl
Related Id(s): GH-7301, PR-7300
Correct handling of retransmission timers, current
behavior could cause unwanted delays.
Full runtime dependencies of ssl-11.0.1: crypto-5.0, erts-14.0,
inets-5.10.7, kernel-9.0, public_key-1.11.3, runtime_tools-1.15.1,
stdlib-4.1
---------------------------------------------------------------------
--- stdlib-5.0.1 ----------------------------------------------------
---------------------------------------------------------------------
The stdlib-5.0.1 application can be applied independently of other
applications on a full OTP 26 installation.
--- Fixed Bugs and Malfunctions ---
OTP-18578 Application(s): kernel, stdlib
Related Id(s): GH-7213
The POSIX error exdev was sometimes incorrectly
described as "cross domain link" in some error
messages.
Full runtime dependencies of stdlib-5.0.1: compiler-5.0, crypto-4.5,
erts-13.1, kernel-9.0, sasl-3.0
---------------------------------------------------------------------
--- xmerl-1.3.32 ----------------------------------------------------
---------------------------------------------------------------------
The xmerl-1.3.32 application can be applied independently of other
applications on a full OTP 26 installation.
--- Fixed Bugs and Malfunctions ---
OTP-18595 Application(s): xmerl
Related Id(s): ERIERL-944
New options to xmerl_scan and xmerl_sax_parser so one
can limit the behaviour of the parsers to avoid some
XML security issues.
xmerl_scan gets one new option:
-- {allow_entities, Boolean} -- Gives the possibility
to disallow entities by setting this option to false
(true is default)
xmerl_sax_parser gets the following options:
-- disallow_entities -- Don't allow entities in
document
-- {entity_recurse_limit, N} -- Set a limit on entity
recursion depth (default is 3)
-- {external_entities, AllowedType} -- Specify which
types of external entities that are allowed, this also
affect external DTD's. The types are all(default), file
and none
-- {fail_undeclared_ref, Boolean} -- Sets the behavior
for undeclared references due to an external file is
not parsed (true is default)
The old option skip_external_dtd is still valid and the
same as {external_entities, none} and
{fail_undeclared_ref, false} but just affects DTD's and
not other external references.
Full runtime dependencies of xmerl-1.3.32: erts-6.0, kernel-3.0,
stdlib-2.5
---------------------------------------------------------------------
---------------------------------------------------------------------
---------------------------------------------------------------------
|