Update all non-major dependencies#1489
Closed
renovate[bot] wants to merge 1 commit intodevelopfrom
Closed
Conversation
ff00bb0 to
c5556ec
Compare
c5556ec to
9c86108
Compare
9c86108 to
fda65ba
Compare
Contributor
|
Closing: includes httpoison 2.3.0 which is blocked by packmatic. Renovate config updated to exclude httpoison — next run should create a clean PR without it. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
0.1.5→0.1.62.7.0→== 2.8.12.28.3→== 2.29.51.7.12→== 1.7.18trixie-20260406→trixie-202604211.4.6→== 1.4.73.13.2→== 3.13.51.18.4-otp-27→1.19.5-otp-271.18.4-otp-28→1.19.528.1→28.52.5.8→== 2.5.92.43.2→== 2.47.22.24.0→== 2.25.62.35.2→== 2.38.10.38.4→== 0.40.10.62.0→== 0.67.00.6.1→== 0.6.20.1.8→== 0.1.1120.20.0→20.20.224.9.0→24.15.02.20.1→== 2.22.15.4.296→5.7.2841.8.1→== 1.8.54.6.5→== 4.7.01.6.1→== 1.6.21.1.13→== 1.1.292.7.4→== 2.8.10.21.1→== 0.22.03.6.2→3.8.32.1.0→== 2.2.00.4.0→== 0.4.10.5.2→== 0.5.60.30.9→== 0.30.12Release Notes
novasoftwarefoundation/prism (@novasoftwarefoundation/prism)
v0.1.6Compare Source
appsignal/appsignal-elixir-phoenix (appsignal_phoenix)
v2.8.1Compare Source
Published on 2025-11-21.
Fixed
v2.8.0Compare Source
Published on 2025-11-20.
Added
Report LiveComponent traces and events separately from LiveView traces and events.
Traces in AppSignal representing updates and event handlers in components will no longer be represented as calls to the view in which the component is mounted, and their events will be part of the
live_componentgroup.This makes it possible to obtain performance measurements for each component individually, instead of grouped by the view that mounts the component.
(minor 1146f7f)
Group samples for calls to
handle_event/3in LiveView and LiveComponent by the event that is being handled. (patch 0c376b2)elixir-cldr/cldr_utils (cldr_utils)
v2.29.5Compare Source
This is the changelog for Cldr Utils v2.29.5 released on March 16th, 2026. For older changelogs please consult the release tag on GitHub
Bug Fixes
Cldr.Digits, fixing a compiler warning on Elixir 1.20.0-rc.2.v2.29.4Compare Source
This is the changelog for Cldr Utils v2.29.4 released on January 25th, 2026. For older changelogs please consult the release tag on GitHub
Bug Fixes
Cldr.Http.get/2which in turn fixes that case clause error reported in #9.v2.29.3Compare Source
This is the changelog for Cldr Utils v2.29.3 released on January 24th, 2026. For older changelogs please consult the release tag on GitHub
Bug Fixes
v2.29.2Compare Source
This is the changelog for Cldr Utils v2.29.2 released on January 17th, 2026. For older changelogs please consult the release tag on GitHub
Bug Fixes
v2.29.1Compare Source
This is the changelog for Cldr Utils v2.29.1 released on November 1st, 2025. For older changelogs please consult the release tag on GitHub
Bug Fixes
Cldr.Math.float_to_ratio/2.v2.29.0Compare Source
This is the changelog for Cldr Utils v2.29.0 released on October 9th, 2025. For older changelogs please consult the release tag on GitHub
Enhancements
Cldr.Math.float_to_ratio/2. This function supports formatting numbers as fractions in the upcoming CLDR 48 and the relevantex_cldrversion. Note that decimals are not currently supported.rrrene/credo (credo)
v1.7.18Compare Source
Check it out on Hex: https://hex.pm/packages/credo/1.7.18
Credo.Check.Warning.UnusedMapOperationfix false positivesv1.7.17Compare Source
Credo.Check.Readability.ModuleDocadd new param:ignore_modules_using(defaults to[Credo.Check, Ecto.Schema, Phoenix.LiveView, ~r/\.Web$/])Credo.Check.Warning.UnusedOperationupdate:modulesparam: instead of a list of functions to check,:allcan be given to check all functions in a moduleCredo.Check.Refactor.CondInsteadOfIfElseCredo.Check.Warning.WrongTestFilenamev1.7.16Compare Source
Credo.Check.Refactor.PassAsyncInTestCasesadd new param:force_comment_on_explicit_false(defaults tofalse)Credo.Check.Warning.Dbgadd new param:allow_captures(defaults tofalse)Credo.Check.Warning.UnusedMapOperationCredo.Check.Warning.UnusedOperationv1.7.15Compare Source
Credo.Check.Warning.ExpensiveEmptyEnumCheckhave better issue messagesCredo.Check.Refactor.MatchInConditionadd new param:allow_operatorsCredo.Check.Refactor.MatchInConditionfix false positiveCredo.Check.Readability.AliasOrderfix false positiveCredo.Check.Readability.FunctionNamesfix false positiveCredo.Check.Readability.SinglePipeadd new param:allow_blocks(defaults totrue)Credo.Check.Refactor.ModuleDependenciesfix false positivev1.7.14Compare Source
DuplicatedCodeCredo.Check.Warning.ExpensiveEmptyEnumCheckto cover less obvious casesCredo.Check.Warning.StructFieldAmountv1.7.13Compare Source
Credo.Check.Refactor.ABCSizefixed false positivejeremyjh/dialyxir (dialyxir)
v1.4.7Compare Source
elixir-ecto/ecto_sql (ecto_sql)
v3.13.5Compare Source
:restrict_violationto:foreign_keyconstraint (required by PostgreSQL 18)v3.13.4Compare Source
Bug fixes
mix ecto.loadwith large dumped databasesv3.13.3Compare Source
Enhancements
:generated:wrap_in_transactionoption to explainBug fixes
structure_load/2for MySQL 9.4+elixir-lang/elixir (elixir)
v1.19.5Compare Source
1. Enhancements
Elixir
2. Bug fixes
Elixir
dbg_callbackis modified at runtimenot inStream.flat_map/2to crashIEx
#iex:breakas part of multi-line promptsLogger
v1.19.4Compare Source
1. Enhancements
Mix
--min-cycle-labelto help projects adapt to the more precisemix xref graphreports in Elixir v1.19. In previous versions, Elixir would break a large compilation cycle into several smaller ones, and therefore developers would check for--min-cycle-sizeon CI. However, the issue is not the size of the cycle (it has no implication in the amount of compiled files), but how many compile-time dependencies (aka compile labels) in a cycle. The new option allows developers to filter on the label parameter2. Bug fixes
Elixir
File.cp_r/3reports non-existing destination properly (instead of source)ExUnit
assertpropagate type informationLogger
Mix
app:APPworks when the project or its dependencies were not yet compiledhexapplication can be included in escriptsv1.19.3Compare Source
1. Enhancements
Elixir
Mix
--force-elixir,--force-app, etc2. Bug fixes
ExUnit
setup_allMix
&Mod.fun/aritycan be written to .app filesv1.19.2Compare Source
1. Enhancements
Elixir
.beamfiles in the compilerMix
--no-check-cwdto skip compiler check to aid debugging2. Bug fixes
Elixir
IO.inspect :label~~~unary operatorLogger
Mix
elixirc_pathsis not a list of string pathsMIX_OS_DEPS_COMPILE_PARTITION_COUNTacrossmix escript.install,mix archive.install, and othersv1.19.1Compare Source
1. Bug fixes
EEx
EEx.compile_stringElixir
dbg/2Mix
v1.18.4Compare Source
This release includes initial support for Erlang/OTP 28, for those who want to try it out. In such cases, you may use Elixir v1.18.4 precompiled for Erlang/OTP 27, as it is binary compatible with Erlang/OTP 28. Note, however, that Erlang/OTP 28 no longer allows regexes to be defined in the module body and interpolated into an attribute. If you do this:
You must rewrite it to:
1. Enhancements
IEx
IEx.Helpers.process_info/1which prints process informationMix
--no-listenersoption--no-listenersoption2. Bug fixes
Elixir
@on_definitioncallbacks@on_loadcallbackssupercallselixir_erlMix
erlang/otp (erlang)
v28.5: OTP 28.5Compare Source
Check out the git tag OTP-28.5, and build a full OTP system including documentation. Apply one or more applications from this build as patches to your installation using the 'otp_patch_apply' tool. For information on install requirements, see descriptions for each application version below.
HIGHLIGHTS
There is a new "Secure Coding Guidelines" document in Design Principles describing how to write secure Erlang code.
Own Id: OTP-20043
Application(s): otp
Related Id(s): PR-10431
OTP-28.5
Improvements and New Features
There is a new "Secure Coding Guidelines" document in Design Principles describing how to write secure Erlang code.
Own Id: OTP-20043
Related Id(s): PR-10431
*** HIGHLIGHT ***
erl_interface-5.7
The erl_interface-5.7 application can be applied independently of other applications on a full OTP 28 installation.
Improvements and New Features
A new
configureoption--{enable,disable}-use-embedded-3pp-alternativeshas been added. When enabled,configureis forced to find alternatives, to a subset, of the embedded third-party products (3pps) in the runtime system, and when disabled,configurewill use all internal embedded 3pps. Currently this option affectszstd,zlib,ryu(withSTL),opensslandtcl. The default is to use all built-in embedded 3pps except forzlibwhich by default will usezlibon the OS if available.Requirements for alternatives:
zstd- Static library and include files of at least version 1.5.6 needs to be available.zlib- Library and include files of at least version 1.2.5 needs to be available.ryu(withSTL) - A usable C++ compiler with C++17 support.openssl- No requirements. Our own MD5 implementation will be used.tcl- Thestrerrorname_np()function (introduced in glibc 2.32) mapping errno integers to symbolic names needs to be available.The argument
embedded_3ppshas been added toerlang:system_info/1. It returns a map with information about the use of embedded 3pps in the runtime system.Own Id: OTP-20106
Related Id(s): PR-11045
Known Bugs and Problems
The
eiAPI for decoding/encoding terms is not fully 64-bit compatible since terms that have a representation on the external term format larger than 2 GB cannot be handled.Own Id: OTP-16607
Related Id(s): OTP-16608
erts-16.4
The erts-16.4 application can be applied independently of other applications on a full OTP 28 installation.
Fixed Bugs and Malfunctions
Fixed bug in
enif_make_map_from_arraysfor arrays with at least 33 keys. If duplicate keys existed, instead of failing, it would skip the duplicates. If less than 33 unique keys existed, an internally inconsistent and broken map was returned.Own Id: OTP-20098
Related Id(s): PR-10976
Fixed an issue when supplying the args_file option to erl.exe on windows that did not handle unicode characters correctly.
Own Id: OTP-20101
Related Id(s): GH-10667
Improvements and New Features
A new
configureoption--{enable,disable}-use-embedded-3pp-alternativeshas been added. When enabled,configureis forced to find alternatives, to a subset, of the embedded third-party products (3pps) in the runtime system, and when disabled,configurewill use all internal embedded 3pps. Currently this option affectszstd,zlib,ryu(withSTL),opensslandtcl. The default is to use all built-in embedded 3pps except forzlibwhich by default will usezlibon the OS if available.Requirements for alternatives:
zstd- Static library and include files of at least version 1.5.6 needs to be available.zlib- Library and include files of at least version 1.2.5 needs to be available.ryu(withSTL) - A usable C++ compiler with C++17 support.openssl- No requirements. Our own MD5 implementation will be used.tcl- Thestrerrorname_np()function (introduced in glibc 2.32) mapping errno integers to symbolic names needs to be available.The argument
embedded_3ppshas been added toerlang:system_info/1. It returns a map with information about the use of embedded 3pps in the runtime system.Own Id: OTP-20106
Related Id(s): PR-11045
mnesia-4.25.3
The mnesia-4.25.3 application can be applied independently of other applications on a full OTP 28 installation.
Fixed Bugs and Malfunctions
Added documentation for
user_propertiesand functionsread_table_property/2,write_table_property/2,delete_table_property. Enhanced documentation forfrag_properties.Own Id: OTP-20038
Related Id(s): GH-10812, PR-10881
Fixed a bug where stacktrace was not returned from
mnesia:transaction/1when transaction aborts with an error exception.Own Id: OTP-20094
Related Id(s): GH-10967, PR-11002
ssl-11.6
Note! The ssl-11.6 application cannot be applied independently of other applications on an arbitrary OTP 28 installation.
Fixed Bugs and Malfunctions
Preserve inet option order, as inet_backend option must be first option. Will make inet_backend option work for ssl independently of number of inet supplied options.
Own Id: OTP-19162
Related Id(s): PR-10908
Missing conformance check for signature algorithms in TLS-1.3 could cause selection of incompatible certificate when a server is configured with more than one possible certificate.
Own Id: OTP-20082
Related Id(s): GH-10915, PR-10924
Improvements and New Features
Avoid unnecessary memory consumption for temporary processes in a supervision tree.
Own Id: OTP-19967
Related Id(s): PR-10957
Thanks to
felipe stival, Hewwho, Hugo Baraúna, Nick Vatamaniuc, Viktor Söderqvist, William Yang
v28.4.3: OTP 28.4.3Compare Source
Check out the git tag OTP-28.4.3, and build a full OTP system including documentation. Apply one or more applications from this build as patches to your installation using the 'otp_patch_apply' tool. For information on install requirements, see descriptions for each application version below.
OTP-28.4.3
Fixed Bugs and Malfunctions
Fix the
otp_patch_applyscript to properly handle installation of documentation for OTP versions with more than one digit in version parts less significant than the major version.Own Id: OTP-20086
Related Id(s): PR-10985
kernel-10.6.3
The kernel-10.6.3 application can be applied independently of other applications on a full OTP 28 installation.
Fixed Bugs and Malfunctions
On Windows, sockets has to be bound when using 'socket'. Therefor when using gen_tcp with inet_backend = socket, gen_tcp_socket bind even if the caller has not provided an explicit bind address. In that case it attempts to locate a "proper" address on its own. But if the connect address is the loopback address, this could lead to an attempt to bind to an external interface. So, this has now been changed so that if the connect address is the loopback address, the loopback address will also be used when binding.
Own Id: OTP-20104
Related Id(s): #10968
ssh-5.5.2
Note! The ssh-5.5.2 application cannot be applied independently of other applications on an arbitrary OTP 28 installation.
Fixed Bugs and Malfunctions
Fixed a vulnerability in the SFTP server where file attributes could be modified outside the configured root directory. When using FSETSTAT on an open file handle, the operation used the path stored in the handle without verifying it was within the root directory, allowing attribute changes to files outside the chroot boundary.
Thanks to John Downey.
Own Id: OTP-20081
Related Id(s): PR-11027, CVE-2026-32147
v28.4.2: OTP 28.4.2Compare Source
Check out the git tag OTP-28.4.2, and build a full OTP system including documentation. Apply one or more applications from this build as patches to your installation using the 'otp_patch_apply' tool. For information on install requirements, see descriptions for each application version below.
POTENTIAL INCOMPATIBILITIES
When OCSP stapling is enabled via the {stapling, staple} or {stapling, #{...}} options, the handshake now fails if the server does not provide an OCSP stapled response.
Previously, a missing OCSP staple was silently accepted (soft-fail). Since Erlang/OTP only supports OCSP via stapling with no fallback to direct OCSP queries or CRL checking, soft-fail meant no revocation check at all.
Applications that need the previous soft-fail behavior can use a custom verify_fun that accepts {bad_cert, missing_ocsp_staple}.
Own Id: OTP-20064
Application(s): ssl
Related Id(s): PR-10941, CVE-2026-32144
compiler-9.0.6
The compiler-9.0.6 application can be applied independently of other applications on a full OTP 28 installation.
Fixed Bugs and Malfunctions
The type inference for
maps:from_list/1was incorrect: when the provided list was statically known to be bogus when non-empty (e.g. a list of atoms), the compiler assumed it would also fail when the list was empty.Own Id: OTP-19506
Related Id(s): GH-9476, PR-9481
Fixed a bug in the type analysis pass that could erroneously eliminate code blocks.
Own Id: OTP-19931
Related Id(s): GH-10562, PR-10569
A binary as the value of a
-moduledoc()attribute would be silently ignored.Own Id: OTP-20065
Related Id(s): GH-10901, PR-10904
erts-16.3.1
The erts-16.3.1 application can be applied independently of other applications on a full OTP 28 installation.
Fixed Bugs and Malfunctions
Fixed a JIT bug that miscompiled expressions like
X * X + X * X.Own Id: OTP-19889
Related Id(s): GH-10454, PR-10456
Fixed bug on windows that made tools dialyzer, erlc and typer unusable in powershell or cmd.exe, when there are spaces in the installation path.
Own Id: OTP-20027
Related Id(s): PR-10620
Fixed a bug with prim_tty that could occur on windows if we cannot get the console mode, mark the TTY as unavailable. This can happen when the input handle is a pipe, but the output handle is a console.
Own Id: OTP-20060
Related Id(s): PR-10899
eunit-2.10.3
The eunit-2.10.3 application can be applied independently of other applications on a full OTP 28 installation.
Fixed Bugs and Malfunctions
Fixed EUnit {node, ...} instantiation by passing node name (instead of pid) and restored net_kernel auto-start for non-distributed nodes.
Own Id: OTP-20047
Related Id(s): PR-10788
inets-9.6.2
The inets-9.6.2 application can be applied independently of other applications on a full OTP 28 installation.
Fixed Bugs and Malfunctions
Fixed authentication bypass in
httpdwhenscript_aliasmaps a URL to a directory outsidedocument_rootwithmod_authdirectory-based access controls. Themod_alias:which_alias/1function now includesscript_aliasentries so authorization is evaluated against the correct path before CGI execution. CVE-2026-28808.Own Id: OTP-20068
Improvements and New Features
Fixed typo in
http_server.mdguideOwn Id: OTP-20044
Related Id(s): GH-10785, PR-10867
Expected error
accept_socket_timeoutin httpd_request_handler now exits gracefully, without generating a crash and supervisor reports.Own Id: OTP-20052
Related Id(s): ERIERL-1310, PR-10893
kernel-10.6.2
The kernel-10.6.2 application can be applied independently of other applications on a full OTP 28 installation.
Fixed Bugs and Malfunctions
Before this patch, the Erlang/OTP built-in DNS resolver (
inet_res) used a sequential, process-global 16-bit transaction ID for UDP queries and did not implement source port randomization. Response validation relied almost entirely on this ID. Together, this made DNS cache poisoning practical for an attacker who can observe one query or predict the next ID. The design conflicted with RFC 5452 recommendations for mitigating forged DNS answers.inet_resis intended for use in trusted network environments and with trusted recursive resolvers. Earlier documentation did not clearly state this deployment assumption, which could lead users to deploy the resolver in environments where faked DNS responses are possible.Therefore, the documentation is been updated to clarify that
inet_resshould only be used in trusted networks and with trusted recursive resolvers.The implementation is also improved to use strong random DNS transaction IDs and source ports for every DNS transaction. This should give ample protection against brute forcing fake DNS replies, known as DNS cache poisoning, but it still does not protect against, for example, an adversary in the path of the DNS transaction that can observe the random values before faking malicious replies, an attack known as DNS spoofing.
For randomization to happen, the Crypto application has to be loaded, which most probably already should be the case for an Erlang node in an exposed network.
If performance should become an issue, for applications within safe network environments, the previous light weight behaviour can be configured by setting the resolver option
randomtofalse.Own Id: OTP-20037
Related Id(s): PR-10864, CVE-2026-28810
public_key-1.20.3
Note! The public_key-1.20.3 application cannot be applied independently of other applications on an arbitrary OTP 28 installation.
Fixed Bugs and Malfunctions
OCSP designated responder certificate verification now checks the CA's cryptographic signature on the responder certificate. Previously, only the issuer DN match and id-kp-OCSPSigning EKU were verified, which meant a forged self-signed certificate with the CA's subject DN would be accepted as a valid designated responder (Case 2 in RFC 6960 §4.2.2.2).
Own Id: OTP-20042
Related Id(s): PR-10873, CVE-2026-32144
Update handling of encoding 'OTPSubjectPublicKeyInfo' in public_key:pkix_encode/3, so that it works for update spec added in OTP-28.
Own Id: OTP-20050
Related Id(s): GH-10876, PR-10889
Improvements and New Features
Relax upper bound of common names in certificates for pragmatic interoperability reasons.
Own Id: OTP-20049
Related Id(s): GH-10606, PR-10866
sasl-4.3.2
The sasl-4.3.2 application can be applied independently of other applications on a full OTP 28 installation.
Fixed Bugs and Malfunctions
Fixed the typespec of release_handler:eval_appup_script/4.
Own Id: OTP-20053
Related Id(s): PR-10906
snmp-5.20.2
The snmp-5.20.2 application can be applied independently of other applications on a full OTP 28 installation.
Improvements and New Features
The SNMP manager now propagates
msgAuthoritativeEngineIDandmsgUserNamefrom USM security parameters through to thesnmpm_user:handle_error/3callback when an incoming message is discarded due to an unknown EngineID (usmStatsUnknownEngineIDs).This enables users to programmatically discover the correct authoritative EngineID from the error callback and re-register USM credentials, supporting SNMPv3 USM EngineID discovery as described in RFC 3414, Section 4. The failed_processing_message variant has been added to the
snmpm:user:handle_error/3callback type specification.Own Id: OTP-20056
Related Id(s): ERIERL-1312, GH-7156, PR-10911
ssl-11.5.4
Note! The ssl-11.5.4 application cannot be applied independently of other applications on an arbitrary OTP 28 installation.
Fixed Bugs and Malfunctions
Server supporting TLS-1.3 and TLS-1.2, with SLH-DSA algorithms for TLS-1.3, now correctly filter out those algorithms if client is TLS-1.2 only, instead of failing with internal error.
Own Id: OTP-20046
Related Id(s): ERIERL-1311, PR-10874
When OCSP stapling is enabled via the {stapling, staple} or {stapling, #{...}} options, the handshake now fails if the server does not provide an OCSP stapled response.
Previously, a missing OCSP staple was silently accepted (soft-fail). Since Erlang/OTP only supports OCSP via stapling with no fallback to direct OCSP queries or CRL checking, soft-fail meant no revocation check at all.
Applications that need the previous soft-fail behavior can use a custom verify_fun that accepts {bad_cert, missing_ocsp_staple}.
Own Id: OTP-20064
Related Id(s): PR-10941, CVE-2026-32144
*** POTENTIAL INCOMPATIBILITY ***
Thanks to
Linus Marton, williamthome
v28.4.1: OTP 28.4.1Compare Source
Check out the git tag OTP-28.4.1, and build a full OTP system including documentation. Apply one or more applications from this build as patches to your installation using the 'otp_patch_apply' tool. For information on install requirements, see descriptions for each application version below.
crypto-5.8.3
The crypto-5.8.3 application can be applied independently of other applications on a full OTP 28 installation.
Fixed Bugs and Malfunctions
Fix memory leak in
crypo:engine_loadif called with incorrect commands.Own Id: OTP-20014
Related Id(s): [PR-10798]
inets-9.6.1
The inets-9.6.1 application can be applied independently of other applications on a full OTP 28 installation.
Fixed Bugs and Malfunctions
The httpd server now rejects HTTP requests containing multiple Content-Length headers with different values, returning a 400 Bad Request response. This prevents potential HTTP request smuggling attacks. Thanks Luigino Camastra at Aisle Research for responsibly disclosing this vulnerability
Own Id: OTP-20007
Related Id(s): [PR-10833], [CVE-2026-23941]
kernel-10.6.1
The kernel-10.6.1 application can be applied independently of other applications on a full OTP 28 installation.
Fixed Bugs and Malfunctions
A vulnerability has been resolved in the (undocumented, unsupported and unused in OTP) inet_dns_tsig module that leads to a validation bypass.
If a request contained an error code (forbidden by spec), it was treated as a response and skipped the verification of the MAC. The user of the module would then receive an "all ok" response, depending on the use case, this could lead to such things as AXFR or UPDATE being allowed.
The code has also been tightening up of the client side to make sure too large (bad) MAC sizes cannot be selected and the limit is the output size of the algorithm chosen.
Own Id: OTP-20012
Related Id(s): [PR-10825]
ssh-5.5.1
Note! The ssh-5.5.1 application cannot be applied independently of other applications on an arbitrary OTP 28 installation.
Fixed Bugs and Malfunctions
Configuration
📅 Schedule: (in timezone Europe/Amsterdam)
* 0-3 * * 1)🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
This PR was generated by Mend Renovate. View the repository job log.