Game of Trees 0.123 released
Contributed by rueda on from the again-and-again-and dept.
Version 0.123 of Game of Trees has been released (and the port updated):
OpenBSD Journal
Contributed by rueda on from the again-and-again-and dept.
Version 0.123 of Game of Trees has been released (and the port updated):
Contributed by Janne Johansson on from the ram-a-llama-ding-dong dept.
Every OpenBSD admin has booted bsd.rd at least once — to install, upgrade, or rescue a broken system. But few people stop to look at what’s actually inside that file.
In this article over at the OpenBSD Jumpstart site, they take a look at just that.
The contents and format of the bsd.rd ramdisk kernel is shown, so you can understand and customize it for your own needs.
Enjoy!
Contributed by rueda on from the again-and-again-and dept.
Version 0.122 of Game of Trees has been released (and the port updated):
Contributed by grey on from the Undeadly ed wonders: "is the goth in gothub.org coincidence?" dept.
Version 0.121 of Game of Trees has been released (and the port updated):
chromium portContributed by rueda on from the veni-vidi-vine dept.
Contributed by Peter N. M. Hansteen on from the raising my family dept.
On our favorite operating system and its siblings, that special case has been handled via the af-to option and special case rules since back in the OpenBSD 5.1 days.
But that special case has always felt a bit awkward to some, and now David Gwynne (dlg@) is airing a patch on tech@ with a view to making af-to "less magical".
In the message titled pf: make af-to less magical, David explains the motivation,
List: openbsd-tech Subject: pf: make af-to less magical From: David Gwynne <david () gwynne ! id ! au> Date: 2026-01-16 2:11:57 Message-ID: aWmebWvdwBi6z98j () animata ! net i only recently figured out that af-to is very special in pf, but i dont think it should be. currently af-to has the following restrictions: 1. it only works for incoming packets, ie, you can only use it on "pass in" rules in pf. 2. it forces the translated packet to be forwarded. a consequence of these, and 2 in particular, is that only one state is created for an af-to connection over the firewall. this is unlike other forwarded connections where there's generally two states created, one when the packet comes in from the wire into the stack, and another when the packet goes out from the stack to the wire.
Contributed by Peter N. M. Hansteen on from the hyper-armed dept.
helg@) and Stefan Fritsch (sf@), OpenBSD/arm64 now works as a guest operating system under the Apple Hypervisor.
The commits read
List: openbsd-cvs Subject: CVS: cvs.openbsd.org: src From: Helg Bredow <helg () cvs ! openbsd ! org> Date: 2026-01-12 18:15:33 CVSROOT: /cvs Module name: src Changes by: helg@cvs.openbsd.org 2026/01/12 11:15:33 Modified files: sys/dev/pv : viogpu.c Log message: viogpu_wsmmap() returns a kva but instead should return a physical address via bus_dmamem_mmap(9). Without this, QEMU would only show a black screen when starting X11. On the Apple Hypervisor, the kernel would panic.
Contributed by Peter N. M. Hansteen on from the strengthen your core muscles dept.
mlarkin@) set the stage for, and next up, bumped the maximum number of processors supported on OpenBSD/amd64 from 64 to 255.
The first commit message reads,
List: openbsd-cvs Subject: CVS: cvs.openbsd.org: src From: Mike Larkin <mlarkin () cvs ! openbsd ! org> Date: 2026-01-14 21:25:26 CVSROOT: /cvs Module name: src Changes by: mlarkin@cvs.openbsd.org 2026/01/14 14:25:26 Modified files: sys/arch/amd64/amd64: pmap.c Log message: Support more than 64 bits for amd64 TLB shootdown IPI masks
Contributed by Peter N. M. Hansteen on from the not the roto rooter dept.
The announcement reads,
Subject: rpki-client 9.7 released From: Sebastian Benoit <benno () openbsd ! org> Date: 2026-01-13 21:05:05 rpki-client 9.7 has just been released and will be available in the rpki-client directory of any OpenBSD mirror soon. It is recommended that all users upgrade to this version for improved reliability. rpki-client is a FREE, easy-to-use implementation of the Resource Public Key Infrastructure (RPKI) for Relying Parties to facilitate validation of BGP announcements. The program queries the global RPKI repository system and validates untrusted network inputs. The program outputs validated ROA payloads, BGPsec Router keys, and ASPA payloads in configuration formats suitable for OpenBGPD and BIRD, and supports emitting CSV and JSON for consumption by other routing stacks.
Donate to OpenBSD
We are constantly on the lookout for stories of how you put OpenBSD to work. Please submit any informative articles on how OpenBSD is helping your company.
OpenBSD 7.8
| 014 | 2026-02-09 SECURITY In libexpat fix denial of service due to NULL dereference and integer overflow. CVE-2026-24515 CVE-2026-25210 |
| 013 | 2026-02-02 SECURITY Fix a use-after-free in httpd(8) when using chunked encoding. |
| 012 | 2026-01-14 RELIABILITY A malicious RPKI Certification Authority can cause a NULL dereference. A malicious RPKI Trust Anchor can cause memory exhaustion. |
| 011 | 2025-12-03 RELIABILITY Due to a race, the kernel could crash when adding IPv6 neighbor discovery entries. |
| 010 | 2025-12-03 SECURITY Fix incomplete mitigation of DNS cache poisoning vulnerabilities in unbound. CVE-2025-11411 |
| 009 | 2025-12-03 SECURITY Fix incorrect handling of invalid inputs to xkbcomp(1). CVE-2018-15853 CVE-2018-15859 CVE-2018-15861 CVE-2018-15863 |
OpenBSD 7.7
| 020 | 2026-02-09 SECURITY In libexpat fix denial of service due to NULL dereference and integer overflow. CVE-2026-24515 CVE-2026-25210 |
| 019 | 2026-02-02 SECURITY Fix a use-after-free in httpd(8) when using chunked encoding. |
| 018 | 2026-01-14 RELIABILITY A malicious RPKI Trust Anchor can cause memory exhaustion. |
| 017 | 2025-12-03 SECURITY Fix incomplete mitigation of DNS cache poisoning vulnerabilities in unbound. CVE-2025-11411 |
| 016 | 2025-12-03 SECURITY Fix incorrect handling of invalid inputs to xkbcomp(1). CVE-2018-15853 CVE-2018-15859 CVE-2018-15861 CVE-2018-15863 |
| 015 | 2025-12-03 RELIABILITY Fix drm(4) to avoid spurious sleep errors leading to crashes. |
Users wishing RSS/RDF summary files of OpenBSD Journal
can retrieve: 
Options are available.
Copyright © - Daniel Hartmeier. All rights reserved. Articles and comments are copyright their respective authors, submission implies license to publish on this web site. Contents of the archive prior to as well as images and HTML templates were copied from the fabulous original deadly.org with Jose's and Jim's kind permission. This journal runs as CGI with httpd(8) on OpenBSD, the source code is BSD licensed. undeadly \Un*dead"ly\, a. Not subject to death; immortal. [Obs.]