For errata on a certain release, click below:
2.0,
2.1,
2.2,
2.3,
2.4,
2.5,
2.6,
2.7,
2.8,
2.9,
3.0,
3.1,
3.2,
3.3,
3.4,
3.5,
3.6,
3.7,
3.8,
3.9,
4.0,
4.1,
4.2,
4.3,
4.4,
4.5,
4.6,
4.7,
4.8,
4.9,
5.0,
5.1,
5.2,
5.3,
5.4,
5.5,
5.6,
5.7,
5.8,
5.9,
6.0,
6.1,
6.2,
6.3,
6.4,
6.5,
6.6.
Patches for the OpenBSD base system are distributed as unified diffs.
Each patch is cryptographically signed with the
signify(1) tool and contains
usage instructions.
All the following patches are also available in one
tar.gz file
for convenience.
Alternatively, the syspatch(8)
utility can be used to apply binary updates on the following architectures:
amd64, i386, arm64.
Patches for supported releases are also incorporated into the
-stable branch, which is maintained for one year
after release.
-
001: SECURITY FIX: May 19, 2020
All architectures
An out-of-bounds index access in wscons(4) can cause a kernel crash.
A source code patch exists which remedies this problem.
-
002: RELIABILITY FIX: May 22, 2020
All architectures
rpki-client could hang because of an improper waitpid idiom for rsync
processes.
A source code patch exists which remedies this problem.
-
003: SECURITY FIX: May 22, 2020
All architectures
When attempting to download resident keys from a FIDO token that does
not require a password/PIN, ssh-keygen would crash with a NULL
dereference.
A source code patch exists which remedies this problem.
-
004: RELIABILITY FIX: May 22, 2020
All architectures
A TLS client with peer verification disabled may crash when contacting a
server that sends an empty certificate list.
A source code patch exists which remedies this problem.
-
005: SECURITY FIX: May 22, 2020
All architectures
Specially crafted queries may crash unbound and unwind.
Both can be tricked into amplifying an incoming query.
A source code patch exists which remedies this problem.
-
006: SECURITY FIX: May 25, 2020
All architectures
Incorrect use of getpeername(2) storage for outgoing IPv6 connections
corrupts stack memory. The nature of the corruption and existing
mitigations appear to make this difficult to effectively target.
A source code patch exists which remedies this problem.
-
007: SECURITY FIX: June 1, 2020
All architectures
Several problems in Perl's regular expression compiler could lead to
corruption of the intermediate language state of a compiled regular
expression.
A source code patch exists which remedies this problem.
-
008: SECURITY FIX: June 5, 2020
All architectures
Malicious HID descriptors could be misparsed.
A source code patch exists which remedies this problem.
-
009: RELIABILITY FIX: June 8, 2020
All architectures
libc's resolver could get into a corrupted state.
A source code patch exists which remedies this problem.
-
010: RELIABILITY FIX: June 11, 2020
All architectures
libcrypto may fail to build a valid certificate chain due to
expired untrusted issuer certificates.
A source code patch exists which remedies this problem.
-
011: SECURITY FIX: July 9, 2020
All architectures
shmget IPC_STAT leaked some kernel data.
A source code patch exists which remedies this problem.
-
012: RELIABILITY FIX: July 16, 2020
All architectures
tty subsystem abuse can impact performance badly.
A source code patch exists which remedies this problem.