mirror of
https://git.haproxy.org/git/haproxy.git/
synced 2025-11-10 21:41:00 +01:00
This bug could be reproduced with -dMfail option and detected by libasan. During the TLS secrets allocations, when failed, quic_tls_ctx_secs_free() is called. It resets the already initialized secrets. Some were detected as initialized when not, or with a non initialized length, which leads to big "memset(0)" detected by libsasan. Ensure that all the secrets are really initialized with correct lengths. No need to be backported.