=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/ssh/packet.c,v retrieving revision 1.208 retrieving revision 1.209 diff -u -r1.208 -r1.209 --- src/usr.bin/ssh/packet.c 2015/02/13 18:57:00 1.208 +++ src/usr.bin/ssh/packet.c 2015/03/11 00:48:39 1.209 @@ -1,4 +1,4 @@ -/* $OpenBSD: packet.c,v 1.208 2015/02/13 18:57:00 markus Exp $ */ +/* $OpenBSD: packet.c,v 1.209 2015/03/11 00:48:39 jsg Exp $ */ /* * Author: Tatu Ylonen * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland @@ -284,6 +284,7 @@ (r = cipher_init(&state->receive_context, none, (const u_char *)"", 0, NULL, 0, CIPHER_DECRYPT)) != 0) { error("%s: cipher_init failed: %s", __func__, ssh_err(r)); + free(ssh); return NULL; } state->newkeys[MODE_IN] = state->newkeys[MODE_OUT] = NULL; @@ -1267,8 +1268,10 @@ * Since we are blocking, ensure that all written packets have * been sent. */ - if ((r = ssh_packet_write_wait(ssh)) != 0) + if ((r = ssh_packet_write_wait(ssh)) != 0) { + free(setp); return r; + } /* Stay in the loop until we have received a complete packet. */ for (;;) {