Erlang/OTP 28.4.2 patch release fixes multiple bugs and addresses two CVEs. Key security fixes include: DNS cache poisoning vulnerability in inet_res (CVE-2026-28810) now mitigated with strong random transaction IDs and source port randomization; OCSP stapling soft-fail behavior changed to hard-fail (CVE-2026-32144), meaning

7m read timeFrom erlangforums.com
Post cover image
Table of contents
POTENTIAL INCOMPATIBILITIEScompiler-9.0.6erts-16.3.1eunit-2.10.3inets-9.6.2kernel-10.6.2public_key-1.20.3sasl-4.3.2snmp-5.20.2ssl-11.5.4Thanks to

Sort: