5.4. What’s Fixed in 7.1.0

[Critical]: System-stopping issue, such as a crash or data loss.
[Major]: Significant issue with no easy workaround.
[Minor]: Issue that usually has a workaround.
[Trivial]: Small issue, such as a typo in a log.

5.4.1. [Critical] Using dh_param_files Leaked Memory

Using the property tls.cipher.dh_param_files leaked memory when deleting the DomainParticipant. A memory checking tool, such as valgrind, would have reported the leak in the OpenSSL function PEM_read_bio_DHparams, which is called by the RTI function RTITLS_tmp_dhparam_callback. This problem only affected applications using OpenSSL 1.0.2 or applications communicating with applications using OpenSSL 1.0.2. For example, TLS Support 5.3 uses OpenSSL 1.0.2, but version 7.0.0 of TLS Support could still communicate with version 5.3, so the leak could also happen in version 7.0.0.

This problem has been fixed; memory will no longer be leaked in this scenario. For example, if TLS Support 7.1.0 communicates with an application using OpenSSL 1.0.2, the leak will not occur.

[RTI Issue ID COREPLG-641]

5.4.2. [Minor] Failure to Load a String-Based Private Key Leaked Memory

If you set the property tls.identity.private_key or tls.identity.rsa_private_key, and you either specified a wrong or missing value for the property tls.identity.private_key_password or specified a malformed private key, then memory would be leaked upon DomainParticipant creation failure. A memory checking tool, such as valgrind, would report the leak in the OpenSSL function BIO_new_mem_buf, which is called by the RTI function RTITLS_context_init.

This problem has been fixed. Memory will no longer be leaked in this scenario.

[RTI Issue ID COREPLG-643]