untrusted comment: verify with openbsd-72-base.pub
RWQTKNnK3CZZ8JQ0BBt1FH1BwcLmKysVlCL+YqQzyPJ2Qdxm4k/khLREjXoXNdeQgkCG9ByzGCaM9IKaS6/9pt5vKh/+eb9swgI=

OpenBSD 7.2 errata 017, February 2, 2023:

A double-free in the sshd pre-auth unprivileged process (not believed
to be exploitable).

Apply by doing:
   signify -Vep /etc/signify/openbsd-72-base.pub -x 017_sshd.patch.sig \
       -m - | (cd /usr/src && patch -p0)

And then rebuild and install sshd:
   cd /usr/src/usr.bin/ssh
   make obj
   make
   make install

Index: usr.bin/ssh/compat.c
===================================================================
RCS file: /cvs/src/usr.bin/ssh/compat.c,v
diff -u -p -u -r1.120 compat.c
--- usr.bin/ssh/compat.c        1 Jul 2022 03:35:45 -0000       1.120
+++ usr.bin/ssh/compat.c        31 Jan 2023 15:43:48 -0000
@@ -188,26 +188,26 @@ compat_pkalg_proposal(struct ssh *ssh, c
char *
compat_kex_proposal(struct ssh *ssh, char *p)
{
-       char *cp = NULL;
+       char *cp = NULL, *cp2 = NULL;

       if ((ssh->compat & (SSH_BUG_CURVE25519PAD|SSH_OLD_DHGEX)) == 0)
               return xstrdup(p);
       debug2_f("original KEX proposal: %s", p);
       if ((ssh->compat & SSH_BUG_CURVE25519PAD) != 0)
-               if ((p = match_filter_denylist(p,
+               if ((cp = match_filter_denylist(p,
                   "[email protected]")) == NULL)
                       fatal("match_filter_denylist failed");
       if ((ssh->compat & SSH_OLD_DHGEX) != 0) {
-               cp = p;
-               if ((p = match_filter_denylist(p,
+               if ((cp2 = match_filter_denylist(cp ? cp : p,
                   "diffie-hellman-group-exchange-sha256,"
                   "diffie-hellman-group-exchange-sha1")) == NULL)
                       fatal("match_filter_denylist failed");
               free(cp);
+               cp = cp2;
       }
-       debug2_f("compat KEX proposal: %s", p);
-       if (*p == '\0')
+       debug2_f("compat KEX proposal: %s", cp);
+       if (*cp == '\0')
               fatal("No supported key exchange algorithms found");
-       return p;
+       return cp;
}