get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/2219519/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2219519,
    "url": "http://patchwork.ozlabs.org/api/patches/2219519/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/buildroot/patch/20260403084250.36050-1-thomas.perale@mind.be/",
    "project": {
        "id": 27,
        "url": "http://patchwork.ozlabs.org/api/projects/27/?format=api",
        "name": "Buildroot development",
        "link_name": "buildroot",
        "list_id": "buildroot.buildroot.org",
        "list_email": "buildroot@buildroot.org",
        "web_url": "",
        "scm_url": "",
        "webscm_url": "",
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20260403084250.36050-1-thomas.perale@mind.be>",
    "list_archive_url": null,
    "date": "2026-04-03T08:42:50",
    "name": "[2025.02.x] package/nghttp2: patch CVE-2026-27135",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "cb052cd5c4363ded5bff0b77daf43e9a2788a5d5",
    "submitter": {
        "id": 87308,
        "url": "http://patchwork.ozlabs.org/api/people/87308/?format=api",
        "name": "Thomas Perale",
        "email": "thomas.perale@mind.be"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/buildroot/patch/20260403084250.36050-1-thomas.perale@mind.be/mbox/",
    "series": [
        {
            "id": 498602,
            "url": "http://patchwork.ozlabs.org/api/series/498602/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/buildroot/list/?series=498602",
            "date": "2026-04-03T08:42:50",
            "name": "[2025.02.x] package/nghttp2: patch CVE-2026-27135",
            "version": 1,
            "mbox": "http://patchwork.ozlabs.org/series/498602/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2219519/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2219519/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<buildroot-bounces@buildroot.org>",
        "X-Original-To": [
            "incoming-buildroot@patchwork.ozlabs.org",
            "buildroot@buildroot.org"
        ],
        "Delivered-To": [
            "patchwork-incoming-buildroot@legolas.ozlabs.org",
            "buildroot@buildroot.org"
        ],
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=buildroot.org header.i=@buildroot.org\n header.a=rsa-sha256 header.s=default header.b=h8XJqi7h;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=buildroot.org\n (client-ip=2605:bc80:3010::137; helo=smtp4.osuosl.org;\n envelope-from=buildroot-bounces@buildroot.org; receiver=patchwork.ozlabs.org)"
        ],
        "Received": [
            "from smtp4.osuosl.org (smtp4.osuosl.org [IPv6:2605:bc80:3010::137])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fnC0g52tqz1yD3\n\tfor <incoming-buildroot@patchwork.ozlabs.org>;\n Fri, 03 Apr 2026 19:42:59 +1100 (AEDT)",
            "from localhost (localhost [127.0.0.1])\n\tby smtp4.osuosl.org (Postfix) with ESMTP id 5630240D14;\n\tFri,  3 Apr 2026 08:42:58 +0000 (UTC)",
            "from smtp4.osuosl.org ([127.0.0.1])\n by localhost (smtp4.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id 2gWdlEtjkK7B; Fri,  3 Apr 2026 08:42:57 +0000 (UTC)",
            "from lists1.osuosl.org (lists1.osuosl.org [140.211.166.142])\n\tby smtp4.osuosl.org (Postfix) with ESMTP id 5D70B40D57;\n\tFri,  3 Apr 2026 08:42:57 +0000 (UTC)",
            "from smtp2.osuosl.org (smtp2.osuosl.org [140.211.166.133])\n by lists1.osuosl.org (Postfix) with ESMTP id 5E80B1A9\n for <buildroot@buildroot.org>; Fri,  3 Apr 2026 08:42:55 +0000 (UTC)",
            "from localhost (localhost [127.0.0.1])\n by smtp2.osuosl.org (Postfix) with ESMTP id 444BD40260\n for <buildroot@buildroot.org>; Fri,  3 Apr 2026 08:42:55 +0000 (UTC)",
            "from smtp2.osuosl.org ([127.0.0.1])\n by localhost (smtp2.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id 2XGn8tl_RUrs for <buildroot@buildroot.org>;\n Fri,  3 Apr 2026 08:42:54 +0000 (UTC)",
            "from mail-wr1-x436.google.com (mail-wr1-x436.google.com\n [IPv6:2a00:1450:4864:20::436])\n by smtp2.osuosl.org (Postfix) with ESMTPS id A8FC8400A0\n for <buildroot@buildroot.org>; Fri,  3 Apr 2026 08:42:53 +0000 (UTC)",
            "by mail-wr1-x436.google.com with SMTP id\n ffacd0b85a97d-43b983bb07eso919793f8f.0\n for <buildroot@buildroot.org>; Fri, 03 Apr 2026 01:42:53 -0700 (PDT)",
            "from arch ([79.132.232.220]) by smtp.gmail.com with ESMTPSA id\n ffacd0b85a97d-43d1e2c637asm13945527f8f.14.2026.04.03.01.42.50\n for <buildroot@buildroot.org>\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Fri, 03 Apr 2026 01:42:51 -0700 (PDT)"
        ],
        "X-Virus-Scanned": [
            "amavis at osuosl.org",
            "amavis at osuosl.org"
        ],
        "X-Comment": "SPF check N/A for local connections - client-ip=140.211.166.142;\n helo=lists1.osuosl.org; envelope-from=buildroot-bounces@buildroot.org;\n receiver=<UNKNOWN> ",
        "DKIM-Filter": [
            "OpenDKIM Filter v2.11.0 smtp4.osuosl.org 5D70B40D57",
            "OpenDKIM Filter v2.11.0 smtp2.osuosl.org A8FC8400A0"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=buildroot.org;\n\ts=default; t=1775205777;\n\tbh=w379+XbIsaBDNgQERWr3QPhg2kbS5wnNoRERaX0pnB8=;\n\th=To:Date:Subject:List-Id:List-Unsubscribe:List-Archive:List-Post:\n\t List-Help:List-Subscribe:From:Reply-To:From;\n\tb=h8XJqi7hihFGlyCXp5xkVGC4N/8uimpJ039RI2yxivXmAetIWj/tgXmSBh8UwSR1y\n\t Z0q5UTME7aYzUOHmw+0/VDpN3N0/fh+SP/05mt8aPDDmwoRtEQ9p/B4mM2CLkX+R1v\n\t +EjWuTZ2/qDWOIQShirauILlG/sJgQgcPYOkvtzsNEejzD1HJJF2p1U4YaC+QPufqY\n\t mDoJbfpMGX8xKQh1KaSXhs3g2/+VxVryYxHh3XK8j88UPmFHX+AobpmEBERtsgpAy0\n\t Wrly16K3ifurHGRuNy+jc5cFsjjgowXKhq5Ry1w6BZO+3f/eymTYorkZ41TH9teC3a\n\t R/FF0WxyjPM+w==",
        "Received-SPF": "Pass (mailfrom) identity=mailfrom;\n client-ip=2a00:1450:4864:20::436; helo=mail-wr1-x436.google.com;\n envelope-from=thomas.perale@essensium.com; receiver=<UNKNOWN>",
        "DMARC-Filter": "OpenDMARC Filter v1.4.2 smtp2.osuosl.org A8FC8400A0",
        "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1775205771; x=1775810571;\n h=content-transfer-encoding:mime-version:message-id:date:subject:to\n :from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date:message-id\n :reply-to;\n bh=9+w1x+PkIWu8g+70ZUMmR18pyahDp04donL3DACjSHM=;\n b=sZj+SSJVg+WBDSWwoel77ewNFaIfbIZ6+vzSpv88xYV2QMbwf7Ku52rp67Iy+ZpIWP\n SHwbc7FKWcW74nL75cLtB7Qf8ovF2OMIaGzxQCphzubhr3xgiJQYnl/hyEHK4tKS6tkj\n JzRdkik7L+gUTZb9BIgEOGRICQ1MxuX3u8ExVBJAsiJoBPM260E9eW6EW70Q24PJ+zW4\n fGKrijradI5cArw61wYJuJtWQ1LVyNGWSyrKyyYazl8okfGJs4IzTR0LmMHy7WAEP4T3\n jS/nKbwy61KB7a25FN/mL0mq0e8CalZCAWzeMBThhw3I85+kdKPrbSyrtgPNufsvZXkI\n eHuQ==",
        "X-Gm-Message-State": "AOJu0Yyfap3eSlCyI/LRjLi3Y6VaW3HW5t9JoU6KbjtEcNm0BEie0Syb\n kimxLfIpErFRMqWB+Uh6fYW9EXRbQiY+sQ/Ex+HLqaB/tbAMlZSMQan5y80ktANBfEh1u59HIyG\n e2sTs2wI=",
        "X-Gm-Gg": "AeBDies46vDoxvsNSW2XuAZvjZrDlnPJ5JYgoxaDmjqfy+Kon+01Brsr8BwhvTyPZ7A\n yj+JjW5hw4yXS6KCUNBH/hqL/OQk4byh9TAlbUjEPtlDazJCH2dlce3R8IqAN6FZrjxmH4iNRG0\n 6l8Cs94PwqE0rkCByrXs0e8B9F/xWg/Dpbrh/c4L70Yry//HUrVN1B5xLAfht8CFil9Ht310rad\n 8TXA3YfqzBMAP5d1WAhlEVflyyLGJJ9zH9ef7bqs1IYjpRlDRr3ywWkyGlHdM9I9bwi8SydOCBK\n fVMdtcy/maddswY83d/MGJzpQF2OIinIWJckc8RbsdwVlhYbhxb9aZB3XrG1UHDMU6fr78yOLtO\n G3ZklUm6uSKOSbDLtl5v5KYleP9qLm52PFBZkQuM1jgcPAnqR1NBJU6iT3OAS0uDlWju0s5kC5N\n gmPeglAfVMFfkjcbHa",
        "X-Received": "by 2002:a05:6000:1865:b0:43c:fd7a:e757 with SMTP id\n ffacd0b85a97d-43d2930fb0dmr3469404f8f.45.1775205771379;\n Fri, 03 Apr 2026 01:42:51 -0700 (PDT)",
        "To": "buildroot@buildroot.org",
        "Date": "Fri,  3 Apr 2026 10:42:50 +0200",
        "Message-ID": "<20260403084250.36050-1-thomas.perale@mind.be>",
        "X-Mailer": "git-send-email 2.53.0",
        "MIME-Version": "1.0",
        "X-Mailman-Original-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=mind.be; s=google; t=1775205771; x=1775810571; darn=buildroot.org;\n h=content-transfer-encoding:mime-version:message-id:date:subject:to\n :from:from:to:cc:subject:date:message-id:reply-to;\n bh=9+w1x+PkIWu8g+70ZUMmR18pyahDp04donL3DACjSHM=;\n b=M8EEV4qpGTDGlo//gDo27/q6WFSC7lFUiNVCNnInWLTcU6+6z5MABU8liEF/DNhYMB\n 3VwkilrFbxO3//zliOjQ/J1H5zoq6zIw+s2PMqgL2zbVtQW/V/2aqFh4Efqq3IrmQjpX\n aLGwumeRPRGMb11Xk4Xfki1aljpfiBxpOwzN0W3JaEcJpP2sgVAQ1diRzI/j7/GSrdId\n 2DNvGPrNHeii2+g+TxuMmlQVhrawIzq+kAX5xcpeTUWPtrm5fPAmb0w+1+p3ByXM/s9e\n ++QvyhCEKEVuj7353g8J09gW1UoTdSyx2L9hliUdsurbnfIdy4e87CAWvIaSHswajLjY\n rG/Q==",
        "X-Mailman-Original-Authentication-Results": [
            "smtp2.osuosl.org;\n dmarc=pass (p=quarantine dis=none)\n header.from=mind.be",
            "smtp2.osuosl.org;\n dkim=pass (2048-bit key,\n unprotected) header.d=mind.be header.i=@mind.be header.a=rsa-sha256\n header.s=google header.b=M8EEV4qp"
        ],
        "Subject": "[Buildroot] [2025.02.x, PATCH] package/nghttp2: patch CVE-2026-27135",
        "X-BeenThere": "buildroot@buildroot.org",
        "X-Mailman-Version": "2.1.30",
        "Precedence": "list",
        "List-Id": "Discussion and development of buildroot <buildroot.buildroot.org>",
        "List-Unsubscribe": "<https://lists.buildroot.org/mailman/options/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=unsubscribe>",
        "List-Archive": "<http://lists.buildroot.org/pipermail/buildroot/>",
        "List-Post": "<mailto:buildroot@buildroot.org>",
        "List-Help": "<mailto:buildroot-request@buildroot.org?subject=help>",
        "List-Subscribe": "<https://lists.buildroot.org/mailman/listinfo/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=subscribe>",
        "From": "Thomas Perale via buildroot <buildroot@buildroot.org>",
        "Reply-To": "Thomas Perale <thomas.perale@mind.be>",
        "Content-Type": "text/plain; charset=\"us-ascii\"",
        "Content-Transfer-Encoding": "7bit",
        "Errors-To": "buildroot-bounces@buildroot.org",
        "Sender": "\"buildroot\" <buildroot-bounces@buildroot.org>"
    },
    "content": "Fixes the following vulnerability:\n\n- CVE-2026-27135:\n    nghttp2 is an implementation of the Hypertext Transfer Protocol\n    version 2 in C. Prior to version 1.68.1, the nghttp2 library stops\n    reading the incoming data when user facing public API\n    `nghttp2_session_terminate_session` or\n    `nghttp2_session_terminate_session2` is called by the application.\n    They might be called internally by the library when it detects the\n    situation that is subject to connection error. Due to the missing\n    internal state validation, the library keeps reading the rest of the\n    data after one of those APIs is called. Then receiving a malformed\n    frame that causes FRAME_SIZE_ERROR causes assertion failure. nghttp2\n    v1.68.1 adds missing state validation to avoid assertion failure. No\n    known workarounds are available.\n\nFor more information, see:\n  - https://www.cve.org/CVERecord?id=CVE-2026-27135\n  - https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1\n\nSigned-off-by: Thomas Perale <thomas.perale@mind.be>\n---\n ...lidations-to-avoid-assertion-failure.patch | 105 ++++++++++++++++++\n package/nghttp2/nghttp2.mk                    |   3 +\n 2 files changed, 108 insertions(+)\n create mode 100644 package/nghttp2/0001-Fix-missing-iframe-state-validations-to-avoid-assertion-failure.patch",
    "diff": "diff --git a/package/nghttp2/0001-Fix-missing-iframe-state-validations-to-avoid-assertion-failure.patch b/package/nghttp2/0001-Fix-missing-iframe-state-validations-to-avoid-assertion-failure.patch\nnew file mode 100644\nindex 0000000000..ef8b9a5a5d\n--- /dev/null\n+++ b/package/nghttp2/0001-Fix-missing-iframe-state-validations-to-avoid-assertion-failure.patch\n@@ -0,0 +1,105 @@\n+From 5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1 Mon Sep 17 00:00:00 2001\n+From: Tatsuhiro Tsujikawa <tatsuhiro.t@gmail.com>\n+Date: Wed, 18 Feb 2026 18:04:30 +0900\n+Subject: [PATCH] Fix missing iframe->state validations to avoid assertion\n+ failure\n+\n+CVE: CVE-2026-27135\n+Upstream: https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1\n+Signed-off-by: Thomas Perale <thomas.perale@mind.be>\n+---\n+ lib/nghttp2_session.c | 32 ++++++++++++++++++++++++++++++++\n+ 1 file changed, 32 insertions(+)\n+\n+diff --git a/lib/nghttp2_session.c b/lib/nghttp2_session.c\n+index bcea547343..0fbcc930b9 100644\n+--- a/lib/nghttp2_session.c\n++++ b/lib/nghttp2_session.c\n+@@ -5573,6 +5573,10 @@ nghttp2_ssize nghttp2_session_mem_recv2(nghttp2_session *session,\n+           return rv;\n+         }\n+ \n++        if (iframe->state == NGHTTP2_IB_IGN_ALL) {\n++          return (nghttp2_ssize)inlen;\n++        }\n++\n+         on_begin_frame_called = 1;\n+ \n+         rv = session_process_headers_frame(session);\n+@@ -6041,6 +6045,10 @@ nghttp2_ssize nghttp2_session_mem_recv2(nghttp2_session *session,\n+           if (nghttp2_is_fatal(rv)) {\n+             return rv;\n+           }\n++\n++          if (iframe->state == NGHTTP2_IB_IGN_ALL) {\n++            return (nghttp2_ssize)inlen;\n++          }\n+         }\n+       }\n+ \n+@@ -6293,6 +6301,10 @@ nghttp2_ssize nghttp2_session_mem_recv2(nghttp2_session *session,\n+           return rv;\n+         }\n+ \n++        if (iframe->state == NGHTTP2_IB_IGN_ALL) {\n++          return (nghttp2_ssize)inlen;\n++        }\n++\n+         session_inbound_frame_reset(session);\n+ \n+         break;\n+@@ -6599,6 +6611,10 @@ nghttp2_ssize nghttp2_session_mem_recv2(nghttp2_session *session,\n+         if (nghttp2_is_fatal(rv)) {\n+           return rv;\n+         }\n++\n++        if (iframe->state == NGHTTP2_IB_IGN_ALL) {\n++          return (nghttp2_ssize)inlen;\n++        }\n+       } else {\n+         iframe->state = NGHTTP2_IB_IGN_HEADER_BLOCK;\n+       }\n+@@ -6775,6 +6791,10 @@ nghttp2_ssize nghttp2_session_mem_recv2(nghttp2_session *session,\n+             rv = session->callbacks.on_data_chunk_recv_callback(\n+               session, iframe->frame.hd.flags, iframe->frame.hd.stream_id,\n+               in - readlen, (size_t)data_readlen, session->user_data);\n++            if (iframe->state == NGHTTP2_IB_IGN_ALL) {\n++              return (nghttp2_ssize)inlen;\n++            }\n++\n+             if (rv == NGHTTP2_ERR_PAUSE) {\n+               return (nghttp2_ssize)(in - first);\n+             }\n+@@ -6861,6 +6881,10 @@ nghttp2_ssize nghttp2_session_mem_recv2(nghttp2_session *session,\n+           return rv;\n+         }\n+ \n++        if (iframe->state == NGHTTP2_IB_IGN_ALL) {\n++          return (nghttp2_ssize)inlen;\n++        }\n++\n+         if (rv != 0) {\n+           busy = 1;\n+ \n+@@ -6879,6 +6903,10 @@ nghttp2_ssize nghttp2_session_mem_recv2(nghttp2_session *session,\n+         return rv;\n+       }\n+ \n++      if (iframe->state == NGHTTP2_IB_IGN_ALL) {\n++        return (nghttp2_ssize)inlen;\n++      }\n++\n+       session_inbound_frame_reset(session);\n+ \n+       break;\n+@@ -6907,6 +6935,10 @@ nghttp2_ssize nghttp2_session_mem_recv2(nghttp2_session *session,\n+         return rv;\n+       }\n+ \n++      if (iframe->state == NGHTTP2_IB_IGN_ALL) {\n++        return (nghttp2_ssize)inlen;\n++      }\n++\n+       session_inbound_frame_reset(session);\n+ \n+       break;\ndiff --git a/package/nghttp2/nghttp2.mk b/package/nghttp2/nghttp2.mk\nindex 98f837e28e..9e051d24ed 100644\n--- a/package/nghttp2/nghttp2.mk\n+++ b/package/nghttp2/nghttp2.mk\n@@ -14,6 +14,9 @@ NGHTTP2_CPE_ID_VENDOR = nghttp2\n NGHTTP2_DEPENDENCIES = host-pkgconf\n NGHTTP2_CONF_OPTS = --enable-lib-only\n \n+# 0001-Fix-missing-iframe-state-validations-to-avoid-assertion-failure.patch\n+NGHTTP2_IGNORE_CVES += CVE-2026-27135\n+\n define NGHTTP2_INSTALL_CLEAN_HOOK\n \t# Remove fetch-ocsp-response script unused by library\n \t$(Q)$(RM) -rf $(TARGET_DIR)/usr/share/nghttp2\n",
    "prefixes": [
        "2025.02.x"
    ]
}