Patches for the OpenBSD base system are distributed as unified diffs.
Each patch is cryptographically signed with the
signify(1) tool and contains
usage instructions.
All the following patches are also available in one
tar.gz file
for convenience.
Alternatively, the syspatch(8)
utility can be used to apply binary updates on the following architectures:
amd64, i386, arm64.
Patches for supported releases are also incorporated into the
-stable branch.
002: RELIABILITY FIX: April 21, 2018All architectures
Additional data is inadvertently removed when private keys are cleared from
TLS configuration, which can prevent OCSP from functioning correctly.
A source code patch exists which remedies this problem.
010: SECURITY FIX: June 17, 2018amd64
Intel CPUs speculatively access FPU registers even when the FPU is disabled,
so data (including AES keys) from previous contexts could be discovered
if using the lazy-save approach.
A source code patch exists which remedies this problem.
018: SECURITY FIX: August 24, 2018amd64
The Intel L1TF bug allows a vmm guest to read host memory.
Install the CPU firmware using fw_update(1) and apply this workaround.
A source code patch exists which remedies this problem.
020: SECURITY FIX: October 25, 2018All architectures
The Xorg X server incorrectly validates certain options, allowing arbitrary
files to be overwritten.
As an immediate (temporary) workaround, the Xorg binary can be disabled
by running: chmod u-s /usr/X11R6/bin/Xorg
A source code patch exists which remedies this problem.
025: RELIABILITY FIX: November 29, 2018All architectures
UNIX domain sockets leak kernel memory with MSG_PEEK on SCM_RIGHTS, or can
attempt excessive memory allocations leading to a crash.
A source code patch exists which remedies this problem.
033: RELIABILITY FIX: May 3, 2019All architectures
If a userland program sets the IPv6 checksum offset on a raw socket,
an incoming packet could crash the kernel. ospf6d is such a program.
A source code patch exists which remedies this problem.