Erlang/OTP 27.1.3

This release of Erlang/OTP can be built from source or installed using pre-built packages for your OS or third-party tools (such as kerl, asdf or mise).

docker run -it erlang:27.1.3
Patch Package OTP 27.1.3
Git Tag OTP-27.1.3
Date 2024-12-05
Issue Id
System OTP
Release 27
Application

common_test-1.27.4 #

The common_test-1.27.4 application can be applied independently of other applications on a full OTP 27 installation.

OTP-19365
Related Id(s):

ERIERL-1157, PR-9080

With this change, cth_surefire hook module handles group path reduction for a skipped group. This fixes a bug manifesting with improper group path for a group executed after a group which was skipped.

OTP-19293
Related Id(s):

ERIERL-1139, PR-8924, PR-8931

With this change, prefix option can be specified in cth_conn_log option list. Option allows to specify how much of additional information is added in raw log output.

Full runtime dependencies of common_test-1.27.4

compiler-6.0, crypto-4.5, debugger-4.1, erts-7.0, ftp-1.0, inets-6.0, kernel-8.4, observer-2.1, runtime_tools-1.8.16, sasl-2.5, snmp-5.1.2, ssh-4.0, stdlib-4.0, syntax_tools-1.7, tools-3.2, xmerl-1.3.8

compiler-8.5.3 #

The compiler-8.5.3 application can be applied independently of other applications on a full OTP 27 installation.

OTP-19340
Related Id(s):

GH-9014, PR-9024

In rare circumstances, the destructive tuple update optimization could be applied when it was unsafe.

OTP-19374
Related Id(s):

GH-9100, PR-9111

In rare circumstances involving appending to multiple binaries, the compile could emit unsafe code that would crash the runtime system.

Full runtime dependencies of compiler-8.5.3

crypto-5.1, erts-13.0, kernel-8.4, stdlib-6.0

erts-15.1.3 #

The erts-15.1.3 application can be applied independently of other applications on a full OTP 27 installation.

OTP-19332
Related Id(s):

#8989

gen_udp:send on domain local can leak inet_reply messages.

OTP-19366
Related Id(s):

ERIERL-1134, OTP-19061

net:getifaddrs does not properly report the running flag on windows.

Full runtime dependencies of erts-15.1.3

kernel-9.0, sasl-3.3, stdlib-4.1

kernel-10.1.2 #

Note! The kernel-10.1.2 application cannot be applied independently of other applications on an arbitrary OTP 27 installation.

   On a full OTP 27 installation, also the following runtime
   dependency has to be satisfied:
   -- erts-15.1 (first satisfied in OTP 27.1)
OTP-19328

On windows the socket:recv could return with success ({ok, Data}) even though not all data had been read.

OTP-19332
Related Id(s):

#8989

gen_udp:send on domain local can leak inet_reply messages.

OTP-19357

Failure to create an UDP IPv6 socket when inet_backend = socket with certain IPv6 socket options.

OTP-19366
Related Id(s):

ERIERL-1134, OTP-19061

net:getifaddrs does not properly report the running flag on windows.

Full runtime dependencies of kernel-10.1.2

crypto-5.0, erts-15.1, sasl-3.0, stdlib-6.0

public_key-1.16.4 #

The public_key-1.16.4 application can be applied independently of other applications on a full OTP 27 installation.

OTP-19240
Related Id(s):

PR-8840, OTP-19532

If both ext-key-usage and key-usage are defined for a certificate it should be checked that these usages are consistent with each other. This will have the affect that such certificates where the ext-key-usages is marked as critical and the usages is consistent with the key-use it can be considered valid without mandatory application specific checks for the ext-key-useage extension.

OTP-19350
Related Id(s):

GH-9009, PR-9053

Handle decoding of EDDSA key properly, when decoding a PEM file that contains only the public EDDSA key.

Full runtime dependencies of public_key-1.16.4

asn1-3.0, crypto-4.6, erts-6.0, kernel-3.0, stdlib-3.5

ssh-5.2.4 #

The ssh-5.2.4 application can be applied independently of other applications on a full OTP 27 installation.

OTP-19326
Related Id(s):

GH-8929, PR-8995

With this change, ssh connection does not crash upon receiving exit-signal message for an already terminated channel.

Full runtime dependencies of ssh-5.2.4

crypto-5.0, erts-14.0, kernel-9.0, public_key-1.6.1, runtime_tools-1.15.1, stdlib-5.0, stdlib-6.0

ssl-11.2.5 #

Note! The ssl-11.2.5 application cannot be applied independently of other applications on an arbitrary OTP 27 installation.

   On a full OTP 27 installation, also the following runtime
   dependency has to be satisfied:
   -- public_key-1.16.4 (first satisfied in OTP 27.1.3)
OTP-19311
Related Id(s):

PR-8980

Avoid generating an internal alert for case that should have been an orderly shutdown by the supervisor.

OTP-19352
Related Id(s):

PR-9130, CVE-2024-53846, OTP-19240

If present, extended key-usage TLS (SSL) role check (pk-clientAuth, pk-serverAuth) should always be performed for peer-cert. An intermediate CA cert may relax the requirement if AnyExtendedKeyUsage purpose is present.

In OTP-25.3.2.8, OTP-26.2 and OTP-27.0 these requirements became too relaxed. There where two problems, firstly the peer cert extension was only checked if it was marked critical, and secondly the CA cert check did not assert the relaxed AnyExtendedKeyUsage purpose.

This could result in that certificates might be misused for purposes not intended by the certificate authority.

Thanks to Bryan Paxton for reporting the issue.

OTP-19325
Related Id(s):

ERIERL-1147, PR-9001

Back port certificate_authorities option for TLS-1.3 servers to pre TLS-1.3 servers to enable them to disable the sending of certificate authorities in their certificate request. This will have same affect as the the TLS-1.3 server option although it is handled by a different mechanism in these versions, where the functionality is described to be more of a guidance, although some pre TLS clients have proven to make it mandatory as in TLS-1.3 extension handling.

Full runtime dependencies of ssl-11.2.5

crypto-5.0, erts-15.0, inets-5.10.7, kernel-9.0, public_key-1.16.4, runtime_tools-1.15.1, stdlib-6.0

Thanks To #

Frej Drejhammar, zmstone