5.4. What’s Fixed in 7.1.0
[Critical]: System-stopping issue, such as a crash or data loss.
[Major]: Significant issue with no easy workaround.
[Minor]: Issue that usually has a workaround.
[Trivial]: Small issue, such as a typo in a log.
5.4.1. [Critical] Using dh_param_files Leaked Memory
Using the property tls.cipher.dh_param_files leaked memory when
deleting the DomainParticipant. A memory checking tool, such as
valgrind, would have reported the leak in the OpenSSL function
PEM_read_bio_DHparams, which is called by the RTI function
RTITLS_tmp_dhparam_callback. This problem only affected applications
using OpenSSL 1.0.2 or applications communicating with applications
using OpenSSL 1.0.2. For example, TLS Support 5.3 uses OpenSSL 1.0.2,
but version 7.0.0 of TLS Support could still communicate with version
5.3, so the leak could also happen in version 7.0.0.
This problem has been fixed; memory will no longer be leaked in this scenario. For example, if TLS Support 7.1.0 communicates with an application using OpenSSL 1.0.2, the leak will not occur.
[RTI Issue ID COREPLG-641]
5.4.2. [Minor] Failure to Load a String-Based Private Key Leaked Memory
If you set the property tls.identity.private_key or
tls.identity.rsa_private_key, and you either specified a wrong or
missing value for the property tls.identity.private_key_password or
specified a malformed private key, then memory would be leaked upon
DomainParticipant creation failure. A memory checking tool, such as
valgrind, would report the leak in the OpenSSL function
BIO_new_mem_buf, which is called by the RTI function
RTITLS_context_init.
This problem has been fixed. Memory will no longer be leaked in this scenario.
[RTI Issue ID COREPLG-643]