Patches for the OpenBSD base system are distributed as unified diffs.
Each patch contains usage instructions.
All the following patches are also available in one
tar.gz file
for convenience.
Patches for supported releases are also incorporated into the
-stable branch.
001: SECURITY FIX: October 8, 2007All architectures
Malicious DHCP clients could cause dhcpd(8) to corrupt its stack
A DHCP client that claimed to require a maximum message size less than
the minimum IP MTU could cause dhcpd(8) to overwrite stack memory.
A source code patch exists which remedies this problem.
003: CD BOOT FAILURE ON OLDER COMPUTERS : October 30, 2007i386 only
Some older BIOSes are unable to boot CD1 (ie. the commercial release sold
by the project, not the CD images available on the net).
A workaround using CD2 (amd64 architecture) is as follows.
(An amd64 machine is NOT required for this to work.)
Insert CD2 and tell your computer to boot it;
When the boot> prompt appears, stop the automatic boot
by pressing the space bar;
Remove CD2 and insert CD1;
Erase the character you typed to stop the boot, type boot /4.2/i386/bsd.rd
then press Enter.
010: SECURITY FIX: March 30, 2008All architectures
sshd(8) would execute ~/.ssh/rc even when a sshd_config(5) ForceCommand
directive was in effect, allowing users with write access to this file to
execute arbitrary commands. This behaviour was documented, but was an unsafe
default and an extra hassle for administrators.
A source code patch exists which remedies this problem.
011: SECURITY FIX: April 3, 2008All architectures
Avoid possible hijacking of X11-forwarded connections with sshd(8)
by refusing to listen on a port unless all address families bind
successfully.
A source code patch exists which remedies this problem.
013: SECURITY FIX: July 23, 2008All architectures 2nd revision, July 23, 2008
A vulnerability has been found with BIND. An attacker could use this vulnerability
to poison the cache of a recursive resolving name server.
CVE-2008-1447.
A source code patch exists which remedies this problem.
014: RELIABILITY FIX: July 29, 2008All architectures
Some kinds of IPv6 usage would leak kernel memory (in particular, this path
was exercised by the named(8) patch for port randomization). Since INET6 is
enabled by default, this condition affects all systems.
A source code patch exists which remedies this problem.
015: SECURITY FIX: October 2, 2008All architectures
The Neighbor Discovery Protocol (ndp) did not correctly verify neighbor
solicitation requests maybe allowing a nearby attacker to intercept traffic.
The attacker must have IPv6 connectivity to the same router as their target for
this vulnerability to be exploited.
CVE-2008-2476.
A source code patch exists which remedies this problem.