For errata on a certain release, click below:
2.0,
2.1,
2.2,
2.3,
2.4,
2.5,
2.6,
2.7,
2.8,
2.9,
3.0,
3.1,
3.2,
3.3,
3.4,
3.5,
3.6,
3.7,
3.8,
3.9,
4.0,
4.1,
4.2,
4.3,
4.4,
4.5,
4.6,
4.7,
4.8,
4.9,
5.0,
5.1,
5.2,
5.3,
5.4,
5.5,
5.6,
5.7,
5.8,
5.9,
6.0,
6.1,
6.2,
6.3,
6.4,
6.5,
6.6,
6.7,
6.9,
7.0,
7.1,
7.2,
7.3,
7.4,
7.5,
7.6,
7.7,
7.8.
Patches for the OpenBSD base system are distributed as unified diffs.
Each patch is cryptographically signed with the
signify(1) tool and contains
usage instructions.
All the following patches are also available in one
tar.gz file
for convenience.
Alternatively, the syspatch(8)
utility can be used to apply binary updates on the following architectures:
amd64, i386, arm64.
Patches for supported releases are also incorporated into the
-stable branch.
- 
001: RELIABILITY FIX: October 29, 2020
  All architectures
 In bgpd, the roa-set parser could leak memory.
 A source code patch exists which remedies this problem.
 
- 
002: SECURITY FIX: October 29, 2020
  All architectures
 When generating the ICMP6 response to an IPv6 packet, the kernel
could use mbuf memory after freeing it.
 A source code patch exists which remedies this problem.
 
- 
003: SECURITY FIX: October 29, 2020
  All architectures
 tmux has a stack overflow in CSI parsing.
 A source code patch exists which remedies this problem.
 
- 
004: RELIABILITY FIX: November 05, 2020
  All architectures
 wg(4) could panic the kernel by releasing the wrong lock.
 A source code patch exists which remedies this problem.
 
- 
005: RELIABILITY FIX: November 10, 2020
  All architectures
 unwind fails to process large DNS replies.
 A source code patch exists which remedies this problem.
 
- 
006: RELIABILITY FIX: November 10, 2020
  All architectures
 rpki-client incorrectly checks the manifest validity interval.
 A source code patch exists which remedies this problem.
 
- 
007: SECURITY FIX: December 1, 2020
  All architectures
 Multiple input validation failures in the X server XKB extension can lead
to out of bounds memory accesses for authorized clients.
 A source code patch exists which remedies this problem.
 
- 
008: SECURITY FIX: December 8, 2020
  All architectures
 Malformed ASN.1 in a certificate revocation list or a timestamp
response token can lead to a NULL pointer dereference.
 A source code patch exists which remedies this problem.
 
- 
009: RELIABILITY FIX: December 8, 2020
  All architectures
 Process exit in multithreaded programs could result in the wrong exit
code being reported.
 A source code patch exists which remedies this problem.
 
- 
010: RELIABILITY FIX: December 24, 2020
  All architectures
 smtpd's filter state machine can prematurely release resources
leading to a crash.
 A source code patch exists which remedies this problem.
 
- 
011: RELIABILITY FIX: January 11, 2021
  All architectures
 When an NDP entry is invalidated the associated layer 2 address
is not invalidated.
 A source code patch exists which remedies this problem.
 
- 
012: RELIABILITY FIX: January 13, 2021
  All architectures
 Use of bpf(4) on a carp interface could result in a use after free
error.
 A source code patch exists which remedies this problem.
 
- 
013: RELIABILITY FIX: February 3, 2021
  All architectures
 Various interoperability issues and memory leaks were discovered in
libcrypto and libssl.
 A source code patch exists which remedies this problem.
 
- 
014: SECURITY FIX: February 24, 2021
  All architectures
 A sequence of overlapping IPv4 fragments could crash the kernel in
pf due to an assertion.
 A source code patch exists which remedies this problem.
 
- 
015: SECURITY FIX: March 4, 2021
  All architectures
 Double free in ssh-agent(1)
 A source code patch exists which remedies this problem.
 
- 
016: SECURITY FIX: March 9, 2021
  All architectures
 npppd PPTP protocol handler can cause heap over-read leading to a crash.
 A source code patch exists which remedies this problem.
 
- 
017: SECURITY FIX: March 15, 2021
  All architectures
 A TLS client using session resumption may cause a use-after-free.
 A source code patch exists which remedies this problem.
 
- 
018: SECURITY FIX: April 13, 2021
  All architectures
 Input validation failures in X server XInput extension can lead to
privileges elevations for authorized clients.
 A source code patch exists which remedies this problem.
 
- 
019: SECURITY FIX: May 18, 2021
  All architectures
 Request length checks were missing in libX11.
 A source code patch exists which remedies this problem.
 
- 
020: SECURITY FIX: May 18, 2021
  amd64
 vmd guest virtio drivers could cause stack overflows by crafting invalid
virtio descriptor lengths.
 A source code patch exists which remedies this problem.
 
- 
021: SECURITY FIX: May 21, 2021
  All architectures
 Insufficient validation of A-MSDUs and fragmented 802.11 frames could
be abused to inject arbitrary frames.
 A source code patch exists which remedies this problem.
 
- 
022: RELIABILITY FIX: May 24, 2021
  amd64
 Recent Intel machines could crash or hang as global mappings were
not flushed from TLB.
 A source code patch exists which remedies this problem.
 
- 
023: RELIABILITY FIX: June 8, 2021
  amd64
 Recent Intel or any AMD machines could crash as the kernel did not
flush all TLBs that multi threaded processes require.
 A source code patch exists which remedies this problem.
 
- 
024_inteldrm: RELIABILITY FIX: June 8, 2021
  amd64, i386
 Disable PPGTT on Intel machines with cherryview/braswell graphics
to avoid memory corruption.
 A source code patch exists which remedies this problem.
 
- 
025: SECURITY FIX: June 9, 2021
  amd64
 vmd guests could cause stack overflows by crafting malicious dhcp
requests when using local interfaces.
 A source code patch exists which remedies this problem.
 
- 
026: SECURITY FIX: July 25, 2021
  mips64
 On mips64, the strchr/index/strrchr/rindex functions in libc handled
signed characters incorrectly.
 A source code patch exists which remedies this problem.
 
- 
027: RELIABILITY FIX: August 04, 2021
  sparc64
 A missaligned address could trigger a kernel assert and panic the kernel.
 A source code patch exists which remedies this problem.
 
- 
028: RELIABILITY FIX: August 11, 2021
  All architectures
 In a specific configuration, wg(4) leaked mbufs.
 A source code patch exists which remedies this problem.
 
- 
029: SECURITY FIX: August 20, 2021
  All architectures
 In LibreSSL, printing a certificate can result in a crash in
X509_CERT_AUX_print().
 A source code patch exists which remedies this problem.
 
- 
030: SECURITY FIX: September 27, 2021
  All architectures
 sshd(8) failed to clear supplemental groups when executing an
AuthorizedUsersCommand or AuthorizedPrincipalsCommand helper program.
 A source code patch exists which remedies this problem.
 
- 
031: SECURITY FIX: September 27, 2021
  All architectures
 In libcrypto, part of LibreSSL, a stack overread could occur when
checking X.509 name constraints.
 A source code patch exists which remedies this problem.
 
- 
032: RELIABILITY FIX: September 30, 2021
  All architectures
 Compensate for the expiry of the DST Root X3 certificate.
 A source code patch exists which remedies this problem.