Erlang/OTP 22.2.1

This release of Erlang/OTP can be built from source or installed using pre-built packages for your OS or third-party tools (such as kerl or asdf).

docker run -it erlang:22.2.1
Patch Package OTP 22.2.1
Git Tag OTP-22.2.1
Date 2019-12-19
Issue Id
ERIERL-444
ERIERL-451
System OTP
Release 22
Application

erts-10.6.1 #

Note! The erts-10.6.1 application *cannot* be applied independently of other applications on an arbitrary OTP 22 installation. On a full OTP 22 installation, also the following runtime dependency has to be satisfied: -- kernel-6.5.1 (first satisfied in OTP 22.2)

OTP-16314
Application(s):
erts
Related Id(s):
ERL-1098

Corrected an issue with the new socket api which could cause a core dump. A race during socket close could cause a core dump (an invalid nif environment free).

OTP-16359
Application(s):
erts

Corrected an issue with the new socket api which could cause a core dump. When multiple accept processes waiting for a connect a connect could cause a core dump.

Full runtime dependencies of erts-10.6.1: kernel-6.5.1, sasl-3.3, stdlib-3.5

snmp-5.4.5 #

The snmp-5.4.5 application can be applied independently of other applications on a full OTP 22 installation.

OTP-16349
Application(s):
snmp
Related Id(s):
ERIERL-444

Its now possible to remove selected varbinds (from the final message) when sending a notification. This is done by setting the 'value' (in the varbind(s) of the varbinds list) to '?NOTIFICATION_IGNORE_VB_VALUE'.

OTP-16360
Application(s):
snmp
Related Id(s):
ERIERL-451

Its now possible to specify that an oid shall be "truncated" (trailing ".0" to be removed) when sending an notification.

Full runtime dependencies of snmp-5.4.5: crypto-3.3, erts-6.0, kernel-3.0, mnesia-4.12, runtime_tools-1.8.14, stdlib-2.5

ssl-9.5.1 #

The ssl-9.5.1 application can be applied independently of other applications on a full OTP 22 installation.

OTP-16357
Application(s):
ssl
Related Id(s):
ERL-1166

Add missing alert handling clause for TLS record handling. Could sometimes cause confusing error behaviors of TLS connections.

OTP-16361
Application(s):
ssl

Fix handling of ssl:recv that happens during a renegotiation. Using the passive receive function ssl:recv/[2,3] during a renegotiation would fail the connection with unexpected msg.

Full runtime dependencies of ssl-9.5.1: crypto-4.2, erts-10.0, inets-5.10.7, kernel-6.0, public_key-1.5, stdlib-3.5