Patch Package: OTP 23.3.4.5 Git Tag: OTP-23.3.4.5 Date: 2021-07-22 Trouble Report Id: OTP-17150, OTP-17475, OTP-17493, OTP-17500, OTP-17506, OTP-17509, OTP-17513, OTP-17522, OTP-17525, OTP-17529 Seq num: GH-4809, GH-4877, GH-4902, GH-4958, GH-4964, GH-5053 System: OTP Release: 23 Application: asn1-5.0.15.1, common_test-1.20.2.2, erts-11.2.2.4, public_key-1.10.0.1, ssl-10.3.1.2, stdlib-3.14.2.2 Predecessor: OTP 23.3.4.4 Check out the git tag OTP-23.3.4.5, and build a full OTP system including documentation. Apply one or more applications from this build as patches to your installation using the 'otp_patch_apply' tool. For information on install requirements, see descriptions for each application version below. --------------------------------------------------------------------- --- asn1-5.0.15.1 --------------------------------------------------- --------------------------------------------------------------------- The asn1-5.0.15.1 application can be applied independently of other applications on a full OTP 23 installation. --- Fixed Bugs and Malfunctions --- OTP-17522 Application(s): asn1 Related Id(s): GH-4902 A parameterized type with a SEQUENCE with extension ("...") made the compiler backend to crash. The previous fix for this in GH-4514 was not complete. Full runtime dependencies of asn1-5.0.15.1: erts-7.0, kernel-3.0, stdlib-2.0 --------------------------------------------------------------------- --- common_test-1.20.2.2 -------------------------------------------- --------------------------------------------------------------------- The common_test-1.20.2.2 application can be applied independently of other applications on a full OTP 23 installation. --- Fixed Bugs and Malfunctions --- OTP-17506 Application(s): common_test An incoming NETCONF notification received before a call to ct_netconfc:create_subscription/* caused the connection process to fail with badarg. Unexpected notifications are now logged in the same way as other unexpected messages. --- Improvements and New Features --- OTP-17509 Application(s): common_test Add 'receiver' option to ct_netconfc To allow a destination for incoming NETCONF notifications to be specified at sessions creation. Previously, a caller of create_subscription/* became the destination, but RFC 5277 create-subscription is no longer the only way in which NETCONF notifications can be ordered. Full runtime dependencies of common_test-1.20.2.2: compiler-6.0, crypto-3.6, debugger-4.1, erts-7.0, ftp-1.0.0, inets-6.0, kernel-4.0, observer-2.1, runtime_tools-1.8.16, sasl-2.4.2, snmp-5.1.2, ssh-4.0, stdlib-3.5, syntax_tools-1.7, tools-2.8, xmerl-1.3.8 --------------------------------------------------------------------- --- erts-11.2.2.4 --------------------------------------------------- --------------------------------------------------------------------- The erts-11.2.2.4 application can be applied independently of other applications on a full OTP 23 installation. --- Fixed Bugs and Malfunctions --- OTP-17493 Application(s): erts Microstate accounting (msacc) and os:perf_counter() unintentionally used system time instead of monotonic time for time measurements on a lot of systems. These systems were all non x86/x86_64 systems or x86/x86_64 systems without a reliable and constant rdtsc instruction. The lock counting (lcnt) built runtime system also unintentionally used system time instead of monotonic time for time measurements on all systems. OTP-17500 Application(s): erts Related Id(s): GH-4809 Simultaneous calls to erlang:system_flag(schedulers_online, _) could cause callers to end up in a suspended state forever. OTP-17513 Application(s): erts Related Id(s): GH-4964, PR-5015 Fix rare race bug in memory management of distribution entries. Have been seen to cause VM crash when massive number of repeated concurrent failing connection attempts. Full runtime dependencies of erts-11.2.2.4: kernel-7.0, sasl-3.3, stdlib-3.13 --------------------------------------------------------------------- --- public_key-1.10.0.1 --------------------------------------------- --------------------------------------------------------------------- The public_key-1.10.0.1 application can be applied independently of other applications on a full OTP 23 installation. --- Fixed Bugs and Malfunctions --- OTP-17475 Application(s): public_key, ssl Related Id(s): GH-4877 Handle cross-signed root certificates when old root expired as reported in GH-4877. Full runtime dependencies of public_key-1.10.0.1: asn1-3.0, crypto-3.8, erts-6.0, kernel-3.0, stdlib-3.5 --------------------------------------------------------------------- --- ssl-10.3.1.2 ---------------------------------------------------- --------------------------------------------------------------------- Note! The ssl-10.3.1.2 application *cannot* be applied independently of other applications on an arbitrary OTP 23 installation. On a full OTP 23 installation, also the following runtime dependency has to be satisfied: -- public_key-1.10.0.1 (first satisfied in OTP 23.3.4.5) --- Fixed Bugs and Malfunctions --- OTP-17475 Application(s): public_key, ssl Related Id(s): GH-4877 Handle cross-signed root certificates when old root expired as reported in GH-4877. OTP-17529 Application(s): ssl Related Id(s): GH-4958, PR-4979 The signature selection algorithm has been changed to also verify if the client supports signatures using the elliptic curve of the server's public/private key pair. This change fixes #4958. --- Improvements and New Features --- OTP-17150 Application(s): ssl Related Id(s): GH-4877 Slight optimization of certificate decoding. Full runtime dependencies of ssl-10.3.1.2: crypto-4.2, erts-10.0, inets-5.10.7, kernel-6.0, public_key-1.10.0.1, stdlib-3.12 --------------------------------------------------------------------- --- stdlib-3.14.2.2 ------------------------------------------------- --------------------------------------------------------------------- The stdlib-3.14.2.2 application can be applied independently of other applications on a full OTP 23 installation. --- Fixed Bugs and Malfunctions --- OTP-17525 Application(s): stdlib Related Id(s): GH-5053 Fix a bug that could cause a crash when formatting tuples using the control sequences p or P and limiting the output with the option chars_limit. Full runtime dependencies of stdlib-3.14.2.2: compiler-5.0, crypto-3.3, erts-11.0, kernel-7.0, sasl-3.0 --------------------------------------------------------------------- --------------------------------------------------------------------- ---------------------------------------------------------------------