Patches for the OpenBSD base system are distributed as unified diffs.
Each patch is cryptographically signed with the
signify(1) tool and contains
usage instructions.
All the following patches are also available in one
tar.gz file
for convenience.
Alternatively, the syspatch(8)
utility can be used to apply binary updates on the following architectures:
amd64, i386, arm64.
Patches for supported releases are also incorporated into the
-stable branch.
004: RELIABILITY FIX: January 14, 2018All architectures
An incorrect TLS extensions block is generated when no extensions are present,
which can result in handshake failures.
A source code patch exists which remedies this problem.
006: RELIABILITY FIX: February 2, 2018All architectures
Processing IPv6 fragments could incorrectly access memory of an mbuf
chain that is not within an mbuf. This may crash the kernel.
A source code patch exists which remedies this problem.
007: SECURITY FIX: February 2, 2018All architectures
If the EtherIP tunnel protocol was disabled, IPv6 packets were not
discarded properly. This causes a double free in the kernel.
A source code patch exists which remedies this problem.
008: SECURITY FIX: February 8, 2018All architectures
A flaw was found in the way unbound validated wildcard-synthesized
NSEC records. An improperly validated wildcard NSEC record could be
used to prove the non-existence (NXDOMAIN answer) of an existing
wildcard record, or trick unbound into accepting a NODATA proof.
A source code patch exists which remedies this problem.
009: SECURITY FIX: March 1, 2018amd64
Intel CPUs contain a speculative execution flaw called Meltdown which
allows userspace programs to access kernel memory.
A complex workaround solves this problem.
017: SECURITY FIX: June 21, 2018amd64
Intel CPUs speculatively access FPU registers even when the FPU is disabled,
so data (including AES keys) from previous contexts could be discovered
if using the lazy-save approach.
A source code patch exists which remedies this problem.
023: SECURITY FIX: August 24, 2018amd64
The Intel L1TF bug allows a vmm guest to read host memory.
Install the CPU firmware using fw_update(1), and apply this workaround.
A source code patch exists which remedies this problem.