diff --git a/erts/doc/src/notes.xml b/erts/doc/src/notes.xml index 7c0df19fb99c..4caf6b2fd28c 100644 --- a/erts/doc/src/notes.xml +++ b/erts/doc/src/notes.xml @@ -31,6 +31,74 @@
This document describes the changes made to the ERTS application.
++ Fix faulty debug assert when page size is larger than + 16kb, like on PowerPC. Did crash debug VM directly at + start.
++ Own Id: OTP-18802
++ On OTP 24 and OTP 25, incoming distributed messages + larger than 64 KiB sent using an alias leaked memory if + the alias had been removed prior to entering the node. + This issue was not present on OTP 26.
++ Incoming distributed messages larger than 64 KiB sent + using an alias which had been removed on the receiving + node could crash the node. This crash was quite unlikely + on OTP 24 and OTP 25, but very likely on OTP 26.
+
+
+ Own Id: OTP-18885 Aux Id: GH-7834, GH-7890, PR-7915
++ Removed unnecessary PCRE source tar-ball.
++ Own Id: OTP-18902
++ Removed unnecessary regexp library used when generating + yielding BIFs.
++ Own Id: OTP-18830 Aux Id: PR-7823
++ Replaced old md5 implementation with an implementation + from OpenSSL.
++ Own Id: OTP-18877
+
+ Removed unused
+ Own Id: OTP-18899
+This document describes the changes made to the asn1 application.
++ Fix benign warning from gcc 11 about mismatching call to + free().
++ Own Id: OTP-18844
+This document describes the changes made to the Erl_interface application.
++ Replaced old md5 implementation with an implementation + from OpenSSL.
++ Own Id: OTP-18877
+
+
+ Own Id: OTP-18850
++ With this change, connection handler does not execute + socket operations until it becomes socket owner. + Previously errors could occur if connection handler tried + to work with socket whose owner exited.
++ Own Id: OTP-18869 Aux Id: PR-7849,GH-7571
++ With this change (being response to CVE-2023-48795), ssh + can negotiate "strict KEX" OpenSSH extension with peers + supporting it; also 'chacha20-poly1305@openssh.com' + algorithm becomes a less preferred cipher.
+
+ If strict KEX availability cannot be ensured on both
+ connection sides, affected encryption modes(CHACHA and
+ CBC) can be disabled with standard ssh configuration.
+ This will provide protection against vulnerability, but
+ at a cost of affecting interoperability. See
+ *** POTENTIAL INCOMPATIBILITY ***
++ Own Id: OTP-18897
+