| Patch Package | OTP 27.3.4.7 |
| Git Tag | OTP-27.3.4.7 |
| Date | 2026-02-05 |
| Issue Id | |
| System | OTP |
| Release | 27 |
| Application |
compiler-8.6.1.3 #
The compiler-8.6.1.3 application can be applied independently of other applications on a full OTP 27 installation.
- OTP-19845
-
Fixed broken type inference for lists:mapfoldl/r.
- OTP-19951
-
- Related Id(s):
Fix a compiler alias analysis bug that can generate unsafe code for repeated binary segments.
Full runtime dependencies of compiler-8.6.1.3
crypto-5.1, erts-13.0, kernel-8.4, stdlib-6.0
erts-15.2.7.5 #
The erts-15.2.7.5 application can be applied independently of other applications on a full OTP 27 installation.
- OTP-19846
-
- Related Id(s):
Fixed a JIT bug that could miscompile equality tests on empty bitstrings.
- OTP-19926
-
- Related Id(s):
Fail the windows build properly when nsis is not recognised.
Full runtime dependencies of erts-15.2.7.5
kernel-9.0, sasl-3.3, stdlib-4.1
megaco-4.7.2.1 #
The megaco-4.7.2.1 application can be applied independently of other applications on a full OTP 27 installation.
- OTP-19896
-
The megaco_tcp module had debug unintentionally enabled.
Full runtime dependencies of megaco-4.7.2.1
asn1-3.0, debugger-4.0, erts-12.0, et-1.5, kernel-8.0, runtime_tools-1.8.14, stdlib-2.5
mnesia-4.23.5.1 #
The mnesia-4.23.5.1 application can be applied independently of other applications on a full OTP 27 installation.
- OTP-19890
-
- Related Id(s):
-
ERIERL-1268, PR-10482
Fixed bug where
mnesia:del_table_copy/3could fail when deleting a node that had tables which was not active anywhere.
Full runtime dependencies of mnesia-4.23.5.1
erts-9.0, kernel-5.3, stdlib-5.0
ssl-11.2.12.5 #
Note! The ssl-11.2.12.5 application cannot be applied independently of other applications on an arbitrary OTP 27 installation.
On a full OTP 27 installation, also the following runtime
dependency has to be satisfied:
-- public_key-1.16.4 (first satisfied in OTP 27.1.3)
- OTP-19795
-
- Related Id(s):
Correct TLS-1.3 alert handling so server will always send the alert with the encryption keys that the client is expecting, that is if for instance if client certification fails the alert will be sent using application traffic encryption keys.
- OTP-19830
-
- Related Id(s):
If two certificate massages are sent to the server generate an unexpected message alert for the second one.
- OTP-19893
-
- Related Id(s):
Corrected app environment handling for session callback that was broken In OTP-23.
- OTP-19948
-
- Related Id(s):
When preforming renegotiation, in TLS-1.2 or previous TLS versions, max_frag_length should not be renegotiated the connection should adhere to originally negotiated value, and if a value was not negotiated it shall not be negotiated now either.
Full runtime dependencies of ssl-11.2.12.5
crypto-5.0, erts-15.0, inets-5.10.7, kernel-9.0, public_key-1.16.4, runtime_tools-1.15.1, stdlib-6.0
xmerl-2.1.3.3 #
The xmerl-2.1.3.3 application can be applied independently of other applications on a full OTP 27 installation.
- OTP-19762
-
- Related Id(s):
-
ERIERL-1260, PR-10437
XML regular expressions in XSD validation now handle
\sand\Scorrectly.
Full runtime dependencies of xmerl-2.1.3.3
erts-6.0, kernel-8.4, stdlib-2.5
Thanks To #
Nelson Vides