Erlang/OTP 28.1.1

This release of Erlang/OTP can be built from source or installed using pre-built packages for your OS or third-party tools (such as kerl, asdf or mise).

docker run -it erlang:28.1.1
Patch Package OTP 28.1.1
Git Tag OTP-28.1.1
Date 2025-10-20
Issue Id
System OTP
Release 28
Application

OTP-28.1.1 #

OTP-19771
Related Id(s):

ERIERL-1251, PR-10194

When building OTP, some applications may be skipped due to lacking dependencies, or due to user choice. Such skipped applications are excluded from the docs build step and a placeholder page is displayed in their stead.

diameter-2.5.2 #

The diameter-2.5.2 application can be applied independently of other applications on a full OTP 28 installation.

OTP-19768
Related Id(s):

GH-10150, PR-10182

Added documentation about ‘proxy’ and ‘resend’ options in diameter:handle_request/3

Full runtime dependencies of diameter-2.5.2

erts-10.0, kernel-3.2, ssl-9.0, stdlib-5.0

erts-16.1.1 #

The erts-16.1.1 application can be applied independently of other applications on a full OTP 28 installation.

OTP-19790
Related Id(s):

PR-9970

Fixed the erl documentation of the default timewarp mode used.

OTP-19799
Related Id(s):

PR-10241

The erlang:suspend_process() BIFs failed to suspend processes currently executing on dirty schedulers.

Full runtime dependencies of erts-16.1.1

kernel-9.0, sasl-3.3, stdlib-4.1

kernel-10.4.1 #

The kernel-10.4.1 application can be applied independently of other applications on a full OTP 28 installation.

OTP-19796
Related Id(s):

ERIERL-1264, PR-10248

With this change group.erl will not crash when receiving unknown message.

Full runtime dependencies of kernel-10.4.1

crypto-5.0, erts-15.2.5, sasl-3.0, stdlib-6.0

ssl-11.4.1 #

Note! The ssl-11.4.1 application cannot be applied independently of other applications on an arbitrary OTP 28 installation.

   On a full OTP 28 installation, also the following runtime
   dependencies have to be satisfied:
   -- crypto-5.7 (first satisfied in OTP 28.1)
   -- public_key-1.18.3 (first satisfied in OTP 28.1)
OTP-19774
Related Id(s):

GH-10191, PR-10201

Fixed so that sending of application data will adhere to max_fragment_length. This was broken in OTP-27 release by an optimization.

OTP-19780
Related Id(s):

GH-10212, GH-10217, PR-10221

PR-10046 put to hard requirements on key file content. Make sure same file can be used as keyfile and certfile

OTP-19791
Related Id(s):

PR-10245

Assert that hello extensions are unique and send an illegal parameter alert if they are not.

OTP-19806
Related Id(s):

PR-10274

Avoid sending an internal message to the user process in conjunction with handling a key update.

Full runtime dependencies of ssl-11.4.1

crypto-5.7, erts-16.0, inets-5.10.7, kernel-10.3, public_key-1.18.3, runtime_tools-1.15.1, stdlib-7.0

xmerl-2.1.7 #

The xmerl-2.1.7 application can be applied independently of other applications on a full OTP 28 installation.

OTP-19792
Related Id(s):

PR-10249, ERERL-1261

The XSD validation failed due to not handling the optional text blocks correctly in an XSD complex type with attribute mixed=true.

Full runtime dependencies of xmerl-2.1.7

erts-6.0, kernel-8.4, stdlib-2.5

Thanks To #

Daniel Gorin, Dmytro Lytovchenko, Jean-Philippe Jodoin