For errata on a certain release, click below:
2.0,
2.1,
2.2,
2.3,
2.4,
2.5,
2.6,
2.7,
2.8,
2.9,
3.0,
3.1,
3.2,
3.3,
3.4,
3.5,
3.6,
3.7,
3.8,
3.9,
4.0,
4.1,
4.2,
4.3,
4.4,
4.5,
4.6,
4.7,
4.8,
4.9,
5.0,
5.1,
5.2,
5.3,
5.4,
5.5,
5.6,
5.7,
5.8,
5.9,
6.0,
6.1,
6.2,
6.3,
6.4,
6.5,
6.6,
6.7,
6.9,
7.0,
7.1,
7.2,
7.3,
7.4.
Patches for the OpenBSD base system are distributed as unified diffs.
Each patch is cryptographically signed with the
signify(1) tool and contains
usage instructions.
All the following patches are also available in one
tar.gz file
for convenience.
Alternatively, the syspatch(8)
utility can be used to apply binary updates on the following architectures:
amd64, i386, arm64.
Patches for supported releases are also incorporated into the
-stable branch.
-
001: RELIABILITY FIX: October 29, 2020
All architectures
In bgpd, the roa-set parser could leak memory.
A source code patch exists which remedies this problem.
-
002: SECURITY FIX: October 29, 2020
All architectures
When generating the ICMP6 response to an IPv6 packet, the kernel
could use mbuf memory after freeing it.
A source code patch exists which remedies this problem.
-
003: SECURITY FIX: October 29, 2020
All architectures
tmux has a stack overflow in CSI parsing.
A source code patch exists which remedies this problem.
-
004: RELIABILITY FIX: November 05, 2020
All architectures
wg(4) could panic the kernel by releasing the wrong lock.
A source code patch exists which remedies this problem.
-
005: RELIABILITY FIX: November 10, 2020
All architectures
unwind fails to process large DNS replies.
A source code patch exists which remedies this problem.
-
006: RELIABILITY FIX: November 10, 2020
All architectures
rpki-client incorrectly checks the manifest validity interval.
A source code patch exists which remedies this problem.
-
007: SECURITY FIX: December 1, 2020
All architectures
Multiple input validation failures in the X server XKB extension can lead
to out of bounds memory accesses for authorized clients.
A source code patch exists which remedies this problem.
-
008: SECURITY FIX: December 8, 2020
All architectures
Malformed ASN.1 in a certificate revocation list or a timestamp
response token can lead to a NULL pointer dereference.
A source code patch exists which remedies this problem.
-
009: RELIABILITY FIX: December 8, 2020
All architectures
Process exit in multithreaded programs could result in the wrong exit
code being reported.
A source code patch exists which remedies this problem.
-
010: RELIABILITY FIX: December 24, 2020
All architectures
smtpd's filter state machine can prematurely release resources
leading to a crash.
A source code patch exists which remedies this problem.
-
011: RELIABILITY FIX: January 11, 2021
All architectures
When an NDP entry is invalidated the associated layer 2 address
is not invalidated.
A source code patch exists which remedies this problem.
-
012: RELIABILITY FIX: January 13, 2021
All architectures
Use of bpf(4) on a carp interface could result in a use after free
error.
A source code patch exists which remedies this problem.
-
013: RELIABILITY FIX: February 3, 2021
All architectures
Various interoperability issues and memory leaks were discovered in
libcrypto and libssl.
A source code patch exists which remedies this problem.
-
014: SECURITY FIX: February 24, 2021
All architectures
A sequence of overlapping IPv4 fragments could crash the kernel in
pf due to an assertion.
A source code patch exists which remedies this problem.
-
015: SECURITY FIX: March 4, 2021
All architectures
Double free in ssh-agent(1)
A source code patch exists which remedies this problem.
-
016: SECURITY FIX: March 9, 2021
All architectures
npppd PPTP protocol handler can cause heap over-read leading to a crash.
A source code patch exists which remedies this problem.
-
017: SECURITY FIX: March 15, 2021
All architectures
A TLS client using session resumption may cause a use-after-free.
A source code patch exists which remedies this problem.
-
018: SECURITY FIX: April 13, 2021
All architectures
Input validation failures in X server XInput extension can lead to
privileges elevations for authorized clients.
A source code patch exists which remedies this problem.
-
019: SECURITY FIX: May 18, 2021
All architectures
Request length checks were missing in libX11.
A source code patch exists which remedies this problem.
-
020: SECURITY FIX: May 18, 2021
amd64
vmd guest virtio drivers could cause stack overflows by crafting invalid
virtio descriptor lengths.
A source code patch exists which remedies this problem.
-
021: SECURITY FIX: May 21, 2021
All architectures
Insufficient validation of A-MSDUs and fragmented 802.11 frames could
be abused to inject arbitrary frames.
A source code patch exists which remedies this problem.
-
022: RELIABILITY FIX: May 24, 2021
amd64
Recent Intel machines could crash or hang as global mappings were
not flushed from TLB.
A source code patch exists which remedies this problem.
-
023: RELIABILITY FIX: June 8, 2021
amd64
Recent Intel or any AMD machines could crash as the kernel did not
flush all TLBs that multi threaded processes require.
A source code patch exists which remedies this problem.
-
024_inteldrm: RELIABILITY FIX: June 8, 2021
amd64, i386
Disable PPGTT on Intel machines with cherryview/braswell graphics
to avoid memory corruption.
A source code patch exists which remedies this problem.
-
025: SECURITY FIX: June 9, 2021
amd64
vmd guests could cause stack overflows by crafting malicious dhcp
requests when using local interfaces.
A source code patch exists which remedies this problem.
-
026: SECURITY FIX: July 25, 2021
mips64
On mips64, the strchr/index/strrchr/rindex functions in libc handled
signed characters incorrectly.
A source code patch exists which remedies this problem.
-
027: RELIABILITY FIX: August 04, 2021
sparc64
A missaligned address could trigger a kernel assert and panic the kernel.
A source code patch exists which remedies this problem.
-
028: RELIABILITY FIX: August 11, 2021
All architectures
In a specific configuration, wg(4) leaked mbufs.
A source code patch exists which remedies this problem.
-
029: SECURITY FIX: August 20, 2021
All architectures
In LibreSSL, printing a certificate can result in a crash in
X509_CERT_AUX_print().
A source code patch exists which remedies this problem.
-
030: SECURITY FIX: September 27, 2021
All architectures
sshd(8) failed to clear supplemental groups when executing an
AuthorizedUsersCommand or AuthorizedPrincipalsCommand helper program.
A source code patch exists which remedies this problem.
-
031: SECURITY FIX: September 27, 2021
All architectures
In libcrypto, part of LibreSSL, a stack overread could occur when
checking X.509 name constraints.
A source code patch exists which remedies this problem.
-
032: RELIABILITY FIX: September 30, 2021
All architectures
Compensate for the expiry of the DST Root X3 certificate.
A source code patch exists which remedies this problem.