get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/2217832/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2217832,
    "url": "http://patchwork.ozlabs.org/api/patches/2217832/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/glibc/patch/20260330172805.16545-1-siddhesh@gotplt.org/",
    "project": {
        "id": 41,
        "url": "http://patchwork.ozlabs.org/api/projects/41/?format=api",
        "name": "GNU C Library",
        "link_name": "glibc",
        "list_id": "libc-alpha.sourceware.org",
        "list_email": "libc-alpha@sourceware.org",
        "web_url": "",
        "scm_url": "",
        "webscm_url": "",
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20260330172805.16545-1-siddhesh@gotplt.org>",
    "list_archive_url": null,
    "date": "2026-03-30T17:28:05",
    "name": "[committed] Document CVE-2026-4046",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "f9466cf421107676c512c4b36ac4556948637c5a",
    "submitter": {
        "id": 69150,
        "url": "http://patchwork.ozlabs.org/api/people/69150/?format=api",
        "name": "Siddhesh Poyarekar",
        "email": "siddhesh@gotplt.org"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/glibc/patch/20260330172805.16545-1-siddhesh@gotplt.org/mbox/",
    "series": [
        {
            "id": 498070,
            "url": "http://patchwork.ozlabs.org/api/series/498070/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/glibc/list/?series=498070",
            "date": "2026-03-30T17:28:05",
            "name": "[committed] Document CVE-2026-4046",
            "version": 1,
            "mbox": "http://patchwork.ozlabs.org/series/498070/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2217832/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2217832/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<libc-alpha-bounces~incoming=patchwork.ozlabs.org@sourceware.org>",
        "X-Original-To": [
            "incoming@patchwork.ozlabs.org",
            "libc-alpha@sourceware.org"
        ],
        "Delivered-To": [
            "patchwork-incoming@legolas.ozlabs.org",
            "libc-alpha@sourceware.org"
        ],
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=gotplt.org header.i=@gotplt.org header.a=rsa-sha256\n header.s=dreamhost header.b=XX/Q69mq;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=sourceware.org\n (client-ip=2620:52:6:3111::32; helo=vm01.sourceware.org;\n envelope-from=libc-alpha-bounces~incoming=patchwork.ozlabs.org@sourceware.org;\n receiver=patchwork.ozlabs.org)",
            "sourceware.org;\n\tdkim=pass (2048-bit key,\n unprotected) header.d=gotplt.org header.i=@gotplt.org header.a=rsa-sha256\n header.s=dreamhost header.b=XX/Q69mq",
            "sourceware.org;\n dmarc=none (p=none dis=none) header.from=gotplt.org",
            "sourceware.org; spf=pass smtp.mailfrom=gotplt.org",
            "server2.sourceware.org;\n arc=pass smtp.remote-ip=23.83.222.61"
        ],
        "Received": [
            "from vm01.sourceware.org (vm01.sourceware.org\n [IPv6:2620:52:6:3111::32])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fkysC3czzz1xrn\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 31 Mar 2026 04:28:47 +1100 (AEDT)",
            "from vm01.sourceware.org (localhost [127.0.0.1])\n\tby sourceware.org (Postfix) with ESMTP id 655A24BAD17F\n\tfor <incoming@patchwork.ozlabs.org>; Mon, 30 Mar 2026 17:28:45 +0000 (GMT)",
            "from fly.ash.relay.mailchannels.net (fly.ash.relay.mailchannels.net\n [23.83.222.61])\n by sourceware.org (Postfix) with ESMTPS id 3F2FF4BA23FD\n for <libc-alpha@sourceware.org>; Mon, 30 Mar 2026 17:28:23 +0000 (GMT)",
            "from relay.mailchannels.net (localhost [127.0.0.1])\n by relay.mailchannels.net (Postfix) with ESMTP id 084E3461979\n for <libc-alpha@sourceware.org>; Mon, 30 Mar 2026 17:28:21 +0000 (UTC)",
            "from pdx1-sub0-mail-a203.dreamhost.com\n (trex-green-9.trex.outbound.svc.cluster.local [100.96.234.227])\n (Authenticated sender: dreamhost)\n by relay.mailchannels.net (Postfix) with ESMTPA id CB16E461E21\n for <libc-alpha@sourceware.org>; Mon, 30 Mar 2026 17:28:19 +0000 (UTC)",
            "from pdx1-sub0-mail-a203.dreamhost.com (pop.dreamhost.com\n [64.90.62.162]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384)\n by 100.96.234.227 (trex/7.1.5); Mon, 30 Mar 2026 17:28:20 +0000",
            "from devel (unknown [38.23.181.90])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n (Authenticated sender: siddhesh@gotplt.org)\n by pdx1-sub0-mail-a203.dreamhost.com (Postfix) with ESMTPSA id 4fkyrg1QfSz3p\n for <libc-alpha@sourceware.org>; Mon, 30 Mar 2026 10:28:19 -0700 (PDT)"
        ],
        "DKIM-Filter": [
            "OpenDKIM Filter v2.11.0 sourceware.org 655A24BAD17F",
            "OpenDKIM Filter v2.11.0 sourceware.org 3F2FF4BA23FD"
        ],
        "DMARC-Filter": "OpenDMARC Filter v1.4.2 sourceware.org 3F2FF4BA23FD",
        "ARC-Filter": "OpenARC Filter v1.0.0 sourceware.org 3F2FF4BA23FD",
        "ARC-Seal": [
            "i=2; a=rsa-sha256; d=sourceware.org; s=key; t=1774891703; cv=pass;\n b=F7L8WCFa5GgdhuJ/kbtEBC4T1nM70V6QhESrPhOVDXw3Xw0stvNk1kUPhjiGjChWQCy5/utcLT67CFCyZaSRtA5li9o3av28yCfPM8fv55cjNWUjnTrYIBwKGSVEzZ44ob8U6Y8D8YkUD/ovZYm+C7qoDF3h/m/jwTCdUafrf6c=",
            "i=1; a=rsa-sha256; d=mailchannels.net; s=arc-2022; cv=none;\n t=1774891699;\n b=7IhSXKK74FM5v7ivYYnKqAUqJCv4oXbPUWS9sOegLjjZFdUvKswKWqelPlILXGmRJ9nJtq\n 7gc0Mvd8XoMhMNdVlCh1jhAVuYimmiyS9TA754oX9+WpOmPwE1HbSxCj/gMvcFTslZQuca\n xL2zYdjBoeCu4FlKPgce7IkmpJ5MNeTAN6FXLJ0kWHH+bF+hmn+CYMVvUOBkjpsypP/NJp\n +QeIU8hD+Bv4G0c4b/EhJLQREYZdVePSZSPoTJcj9ZhCgUzVzPfLfbvIXBX/Wv9o63Vl/N\n 72p84XQcgQt1NwY/MO/DmGMac2gQEOCI4dOKcDFezbZVC495dFFKwJ9axFWyPg=="
        ],
        "ARC-Message-Signature": [
            "i=2; a=rsa-sha256; d=sourceware.org; s=key;\n t=1774891703; c=relaxed/simple;\n bh=VuuOxcfrqMQBkrgAftWeaPwjczJU+w8DbIxydhG+Jj4=;\n h=DKIM-Signature:From:To:Subject:Date:Message-ID:MIME-Version;\n b=aKxKBGu1BmcIuZdqX+ThWIKBNLqHObQObsHpFE0bVVKHd9wuSYJdJyFUSUbEVtBKbpZMyndzf+NUZprJTzWA0t+r0S0eL53sOyv13ez8pav7rcYXzHnVjRR0juCVKjekOkSKVj2FwxHA17wiolIpJ08TO5UsyPqFB+zHKPXvmRE=",
            "i=1; a=rsa-sha256; c=relaxed/relaxed;\n d=mailchannels.net; s=arc-2022; t=1774891699;\n h=from:from:reply-to:subject:subject:date:date:message-id:message-id:\n to:to:cc:mime-version:mime-version:\n content-transfer-encoding:content-transfer-encoding:dkim-signature;\n bh=6z5ayEh8lqnyDn5RaCyOh5HwYIgFhh5+BKZFlZ92Vpk=;\n b=3XI7q1ftcc84+KlNNavdRS0zDOl1YjFupo0oN9mcM7RWYiEH2B0KqeLn0difcgYkll/im9\n oDPCglCJXI8Q3X6MHF/F+HnDXJvs9HXhyr8L96KXRrPYdW1FAZ49ghYIsVjbxhz5KUwuyq\n rrpH+rthssGzrOGljXeeTyQhzzwWSCkCdSvFwOofyQRfaQ552j703zGizuaemTWTMu7IuP\n A5ngj1mUyRqb2mBaAym2s+g4uQkkjCtLiuDSDCpYwjvHSA6yPxZ1/fhTA/teYnBsu19APi\n pHwmsmaCJiC1SNmyzA2nTQjfnFL73sWqr438voz7uv4Wdu8dtw47dgcUWzf97Q=="
        ],
        "ARC-Authentication-Results": [
            "i=2; server2.sourceware.org",
            "i=1; rspamd-db964497c-bv62x;\n auth=pass smtp.auth=dreamhost smtp.mailfrom=siddhesh@gotplt.org"
        ],
        "X-Sender-Id": [
            "dreamhost|x-authsender|siddhesh@gotplt.org",
            "dreamhost|x-authsender|siddhesh@gotplt.org"
        ],
        "X-MC-Relay": "Neutral",
        "X-MailChannels-SenderId": "dreamhost|x-authsender|siddhesh@gotplt.org",
        "X-MailChannels-Auth-Id": "dreamhost",
        "X-Shoe-Trail": "3040250e49c0e9d0_1774891700857_51151380",
        "X-MC-Loop-Signature": "1774891700857:3423029130",
        "X-MC-Ingress-Time": "1774891700857",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=gotplt.org;\n s=dreamhost; t=1774891699;\n bh=6z5ayEh8lqnyDn5RaCyOh5HwYIgFhh5+BKZFlZ92Vpk=;\n h=From:To:Subject:Date:Content-Transfer-Encoding;\n b=XX/Q69mqOxZcyg3jEclWKO0VVdRSPvBr1IXiQv9iKUApO5+iHEFsL7ROwp1W0kTt1\n JQr0RDRRad3HzBYOn7qiDEH0QE0R0Vq0abVVgsWrDWD0D4tlmuieWx7iWSnNgEKUyL\n /Euif6EYRfoMlLnVG8QWujj27/w6QzmzuLiuPXmf/xIyIopH2FPeDWjadcq4898rbG\n /T3r1a+SCiS0cW45ASgq42iSgsNwottaB1xhN2GpfAEgmGryV7Xv9A/VEeBhh6Cvx0\n 0uhrxuiYY3beVWZ0VIub7sGQ7tGt1imUT3Oh38OimPkIgjdKqMlifyKWHZsMQO4Hta\n bK3DOYnDzvLEg==",
        "From": "Siddhesh Poyarekar <siddhesh@gotplt.org>",
        "To": "libc-alpha@sourceware.org",
        "Subject": "[committed] Document CVE-2026-4046",
        "Date": "Mon, 30 Mar 2026 13:28:05 -0400",
        "Message-ID": "<20260330172805.16545-1-siddhesh@gotplt.org>",
        "X-Mailer": "git-send-email 2.52.0",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "X-BeenThere": "libc-alpha@sourceware.org",
        "X-Mailman-Version": "2.1.30",
        "Precedence": "list",
        "List-Id": "Libc-alpha mailing list <libc-alpha.sourceware.org>",
        "List-Unsubscribe": "<https://sourceware.org/mailman/options/libc-alpha>,\n <mailto:libc-alpha-request@sourceware.org?subject=unsubscribe>",
        "List-Archive": "<https://sourceware.org/pipermail/libc-alpha/>",
        "List-Post": "<mailto:libc-alpha@sourceware.org>",
        "List-Help": "<mailto:libc-alpha-request@sourceware.org?subject=help>",
        "List-Subscribe": "<https://sourceware.org/mailman/listinfo/libc-alpha>,\n <mailto:libc-alpha-request@sourceware.org?subject=subscribe>",
        "Errors-To": "libc-alpha-bounces~incoming=patchwork.ozlabs.org@sourceware.org"
    },
    "content": "Signed-off-by: Siddhesh Poyarekar <siddhesh@gotplt.org>\n---\n advisories/GLIBC-SA-2026-0007 | 14 ++++++++++++++\n 1 file changed, 14 insertions(+)\n create mode 100644 advisories/GLIBC-SA-2026-0007",
    "diff": "diff --git a/advisories/GLIBC-SA-2026-0007 b/advisories/GLIBC-SA-2026-0007\nnew file mode 100644\nindex 0000000000..b960525e7f\n--- /dev/null\n+++ b/advisories/GLIBC-SA-2026-0007\n@@ -0,0 +1,14 @@\n+iconv crash due to assertion failure with untrusted input\n+\n+The iconv() function in the GNU C Library versions 2.43 and earlier may\n+crash due to an assertion failure when converting inputs from the\n+IBM1390 or IBM1399 character sets, which may be used to remotely crash\n+an application.\n+\n+This vulnerability can be trivially mitigated by removing the IBM1390\n+and IBM1399 character sets from systems that do not need them.\n+\n+CVE-Id: CVE-2026-4046\n+Public-Date: 2026-03-12\n+Vulnerable-Commit: 0ecb606cb6cf65de1d9fc8a919bceb4be476c602 (2.3.3-1501)\n+Reported-by: Rocket Ma\n",
    "prefixes": [
        "committed"
    ]
}