get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/2225038/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2225038,
    "url": "http://patchwork.ozlabs.org/api/patches/2225038/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/buildroot/patch/20260420095823.2561132-1-titouan.christophe@mind.be/",
    "project": {
        "id": 27,
        "url": "http://patchwork.ozlabs.org/api/projects/27/?format=api",
        "name": "Buildroot development",
        "link_name": "buildroot",
        "list_id": "buildroot.buildroot.org",
        "list_email": "buildroot@buildroot.org",
        "web_url": "",
        "scm_url": "",
        "webscm_url": "",
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20260420095823.2561132-1-titouan.christophe@mind.be>",
    "list_archive_url": null,
    "date": "2026-04-20T09:58:23",
    "name": "package/systemd: security bump to v258.7",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": false,
    "hash": "3947eae6dd3df7d34c766f670269c527c50b64d0",
    "submitter": {
        "id": 90763,
        "url": "http://patchwork.ozlabs.org/api/people/90763/?format=api",
        "name": "Titouan Christophe",
        "email": "titouan.christophe@mind.be"
    },
    "delegate": {
        "id": 161283,
        "url": "http://patchwork.ozlabs.org/api/users/161283/?format=api",
        "username": "Bubu",
        "first_name": "Marcus",
        "last_name": "Hoffmann",
        "email": "bubu@bubu1.eu"
    },
    "mbox": "http://patchwork.ozlabs.org/project/buildroot/patch/20260420095823.2561132-1-titouan.christophe@mind.be/mbox/",
    "series": [
        {
            "id": 500584,
            "url": "http://patchwork.ozlabs.org/api/series/500584/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/buildroot/list/?series=500584",
            "date": "2026-04-20T09:58:23",
            "name": "package/systemd: security bump to v258.7",
            "version": 1,
            "mbox": "http://patchwork.ozlabs.org/series/500584/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2225038/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2225038/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<buildroot-bounces@buildroot.org>",
        "X-Original-To": [
            "incoming-buildroot@patchwork.ozlabs.org",
            "buildroot@buildroot.org"
        ],
        "Delivered-To": [
            "patchwork-incoming-buildroot@legolas.ozlabs.org",
            "buildroot@buildroot.org"
        ],
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=buildroot.org header.i=@buildroot.org\n header.a=rsa-sha256 header.s=default header.b=UhfP5uAm;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=buildroot.org\n (client-ip=140.211.166.138; helo=smtp1.osuosl.org;\n envelope-from=buildroot-bounces@buildroot.org; receiver=patchwork.ozlabs.org)"
        ],
        "Received": [
            "from smtp1.osuosl.org (smtp1.osuosl.org [140.211.166.138])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fzgtP6l96z1yGs\n\tfor <incoming-buildroot@patchwork.ozlabs.org>;\n Mon, 20 Apr 2026 19:58:53 +1000 (AEST)",
            "from localhost (localhost [127.0.0.1])\n\tby smtp1.osuosl.org (Postfix) with ESMTP id A87A48284B;\n\tMon, 20 Apr 2026 09:58:51 +0000 (UTC)",
            "from smtp1.osuosl.org ([127.0.0.1])\n by localhost (smtp1.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id qmiRP7nn1OEK; Mon, 20 Apr 2026 09:58:49 +0000 (UTC)",
            "from lists1.osuosl.org (lists1.osuosl.org [140.211.166.142])\n\tby smtp1.osuosl.org (Postfix) with ESMTP id CE7E68277E;\n\tMon, 20 Apr 2026 09:58:49 +0000 (UTC)",
            "from smtp3.osuosl.org (smtp3.osuosl.org [IPv6:2605:bc80:3010::136])\n by lists1.osuosl.org (Postfix) with ESMTP id 903D824D\n for <buildroot@buildroot.org>; Mon, 20 Apr 2026 09:58:48 +0000 (UTC)",
            "from localhost (localhost [127.0.0.1])\n by smtp3.osuosl.org (Postfix) with ESMTP id 8CB97610BE\n for <buildroot@buildroot.org>; Mon, 20 Apr 2026 09:58:48 +0000 (UTC)",
            "from smtp3.osuosl.org ([127.0.0.1])\n by localhost (smtp3.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id gfpUEjiPwiof for <buildroot@buildroot.org>;\n Mon, 20 Apr 2026 09:58:47 +0000 (UTC)",
            "from mail-wm1-x32f.google.com (mail-wm1-x32f.google.com\n [IPv6:2a00:1450:4864:20::32f])\n by smtp3.osuosl.org (Postfix) with ESMTPS id B726B610B3\n for <buildroot@buildroot.org>; Mon, 20 Apr 2026 09:58:46 +0000 (UTC)",
            "by mail-wm1-x32f.google.com with SMTP id\n 5b1f17b1804b1-488a9033b2cso31890275e9.2\n for <buildroot@buildroot.org>; Mon, 20 Apr 2026 02:58:45 -0700 (PDT)",
            "from dragon (ip-94-140-185-241.reverse.destiny.be. [94.140.185.241])\n by smtp.gmail.com with ESMTPSA id\n 5b1f17b1804b1-488fc0f82bbsm448033415e9.3.2026.04.20.02.58.43\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Mon, 20 Apr 2026 02:58:43 -0700 (PDT)"
        ],
        "X-Virus-Scanned": [
            "amavis at osuosl.org",
            "amavis at osuosl.org"
        ],
        "X-Comment": "SPF check N/A for local connections - client-ip=140.211.166.142;\n helo=lists1.osuosl.org; envelope-from=buildroot-bounces@buildroot.org;\n receiver=<UNKNOWN> ",
        "DKIM-Filter": [
            "OpenDKIM Filter v2.11.0 smtp1.osuosl.org CE7E68277E",
            "OpenDKIM Filter v2.11.0 smtp3.osuosl.org B726B610B3"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=buildroot.org;\n\ts=default; t=1776679129;\n\tbh=+bJ8SD3UMg92JGa4f+hY26NuB+z6bSwMm/+PblpOLQA=;\n\th=To:Cc:Date:Subject:List-Id:List-Unsubscribe:List-Archive:\n\t List-Post:List-Help:List-Subscribe:From:Reply-To:From;\n\tb=UhfP5uAmiTp3gxEaIMZWlLipqoAnruWiPf3xITn65YiqL4vuapsxYUR7S4+LBDDap\n\t iuANAWjFZibwnBqGvIxYacymmP4yLeX4LYVK8kfHeB+rTSKweYarmI0+M6c1vzqmpn\n\t ojSVzswVbGWal63I0vrgfkcFzeyMW/zwrk1+EgG+fIefefeFDGLoLNL8r1SuRv5aX2\n\t J/Jnx3u674nZ27rNgAygvHVTgJE6hGYxClPXVTYeWQfmXxcNguZU5eJuhP5/1ubDuv\n\t psa18mNHg5d3d66FpaUO1aWmpVoSQAhafh+VwnM/f8iPGlp+TF0xZssJcbuoEpNAU5\n\t zxMM90J0lE5fw==",
        "Received-SPF": "Pass (mailfrom) identity=mailfrom;\n client-ip=2a00:1450:4864:20::32f; helo=mail-wm1-x32f.google.com;\n envelope-from=titouan.christophe@essensium.com; receiver=<UNKNOWN>",
        "DMARC-Filter": "OpenDMARC Filter v1.4.2 smtp3.osuosl.org B726B610B3",
        "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776679124; x=1777283924;\n h=content-transfer-encoding:mime-version:message-id:date:subject:cc\n :to:from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date\n :message-id:reply-to;\n bh=2lsEG0SoP2y1yVEoKdjn14rM7sZEeKmrm6fScypOBsw=;\n b=MDY+kp6h/0FyPATvuvq6GmcM2U+KlM2qATfAMT6GwgpvbdBW2DPUg3X3Ptwv7+JStA\n bj3HjVLt/lEZQ2gWx+z/jJCf0YOyWQq/qPMXBWGNSmuRFRlF19uUkywn1niSTrT0B2qc\n BjqrnLAlhe9udzKALqoOzx5lcxuZhAth21Hma9X3gTygDy8i6L4+QFGeAuZ2YPgcYN4m\n VUhoQMspnsa4ttMtYKMDlTEPWQvCLGSl7TbU9Ylx2SrxQYEJqkHp+ZtidigZqT8Q5yYl\n X24O3mqF8y/QakLGKXJ6Kln375Ies445JK4vkfRKiH1qXPTPrdK57pqKmVrEEfmpUyrH\n zZrA==",
        "X-Gm-Message-State": "AOJu0Yzyisjn/XI2sLg9TsL0/Y4xZx5ezu6F27RqUBOhRSQ2qRas88N6\n Pav/tnrl1vGIcrHIqsCz6G8lw5WL7QwO+2/1/GA0yHwwxrxkNU8UhLbv+IRNWDV1NFWcohnO6NG\n QajfJ",
        "X-Gm-Gg": "AeBDieugjW627+cLosZlkmrSWWuEzcoY65nZ1o0IenSU8OTVj+mBf6Jm8908iD4Ofpl\n MDDseW7stkmE59iylZpKIGVHKa3Jf+2hMZbMFCy6YXpKIvkx0QSosjmxvPAjvUx2XdBgCimqKsM\n FEg94Mv67MwycGCFpgu9aUWcbyvayGjpgEMBlCR+kspw9PGfpLc2EMEHMorJL23HsmoZmsvWayz\n 386ub6jx/2FMhggIIElCu/+HY2CxTyL4Ig18GZ++PEuJ+FdEhkap/sjtpG+XKnsBZSgWJewMc2I\n wXKaHylo2rA+4S7EiE8402VbyyvDi6iJn87uPFS5Mvhkon2Ubt2suPW9js3pM67LGCYkTqyO4Th\n eG2hP0Q20GuNyC5we7TWX3skyZF65R2GClFKvZ+GI5RD7V785PGJnCfM1qBxmuOXfQef6cDjIQ1\n WiF4HF2bcblDpPUav7+HO42kbTe9pZLUIeXgfKO9/bDTIqS5yPwmTPtQfyDwqvUr3SvcGeICJK3\n RYk",
        "X-Received": "by 2002:a05:600c:19d4:b0:48a:5339:ef0e with SMTP id\n 5b1f17b1804b1-48a5339ef15mr218285e9.3.1776679124089;\n Mon, 20 Apr 2026 02:58:44 -0700 (PDT)",
        "To": "buildroot@buildroot.org",
        "Cc": "Norbert Lange <nolange79@gmail.com>,\n\tSen Hastings <sen@hastings.org>",
        "Date": "Mon, 20 Apr 2026 11:58:23 +0200",
        "Message-ID": "<20260420095823.2561132-1-titouan.christophe@mind.be>",
        "X-Mailer": "git-send-email 2.53.0",
        "MIME-Version": "1.0",
        "X-Mailman-Original-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=mind.be; s=google; t=1776679124; x=1777283924; darn=buildroot.org;\n h=content-transfer-encoding:mime-version:message-id:date:subject:cc\n :to:from:from:to:cc:subject:date:message-id:reply-to;\n bh=2lsEG0SoP2y1yVEoKdjn14rM7sZEeKmrm6fScypOBsw=;\n b=N5SB55sLAhvpnYlFZQf8a6TY8NokQqktN5b6fMPeWzBeAwE/sGkaWpVyiboYLiHfMA\n lq2ka8fi1GwfCzrxd3ddU4UQl+nOHPagRooV0IvD61JTJQ62pRjElFJ4q9yoPUTEMp5F\n 5fjxQE48TH91X4gjWnb4gzfHZ8c1G8Js0xvhymFB7ka3WYh88LzNa99v3YNgUm6zEbc6\n PvJFU73t3hBVvB0nHbZbA/+koJ6IGoDis55rp7sgNZ24yGYgWVpcHOg+VF8zredfz0X8\n of2R+mVt6juCMBh/TS+o3QrFDcGboh/UqzY3Qt+/QSprtwHH2nSGgX9dHt/BEz3vwo6y\n El2g==",
        "X-Mailman-Original-Authentication-Results": [
            "smtp3.osuosl.org;\n dmarc=pass (p=quarantine dis=none)\n header.from=mind.be",
            "smtp3.osuosl.org;\n dkim=pass (2048-bit key,\n unprotected) header.d=mind.be header.i=@mind.be header.a=rsa-sha256\n header.s=google header.b=N5SB55sL"
        ],
        "Subject": "[Buildroot] [PATCH] package/systemd: security bump to v258.7",
        "X-BeenThere": "buildroot@buildroot.org",
        "X-Mailman-Version": "2.1.30",
        "Precedence": "list",
        "List-Id": "Discussion and development of buildroot <buildroot.buildroot.org>",
        "List-Unsubscribe": "<https://lists.buildroot.org/mailman/options/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=unsubscribe>",
        "List-Archive": "<http://lists.buildroot.org/pipermail/buildroot/>",
        "List-Post": "<mailto:buildroot@buildroot.org>",
        "List-Help": "<mailto:buildroot-request@buildroot.org?subject=help>",
        "List-Subscribe": "<https://lists.buildroot.org/mailman/listinfo/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=subscribe>",
        "From": "Titouan Christophe via buildroot <buildroot@buildroot.org>",
        "Reply-To": "Titouan Christophe <titouan.christophe@mind.be>",
        "Content-Type": "text/plain; charset=\"us-ascii\"",
        "Content-Transfer-Encoding": "7bit",
        "Errors-To": "buildroot-bounces@buildroot.org",
        "Sender": "\"buildroot\" <buildroot-bounces@buildroot.org>"
    },
    "content": "This fixes the following vulnerabilities:\n\n- CVE-2026-29111:\n    systemd, a system and service manager, (as PID 1) hits an assert and\n    freezes execution when an unprivileged IPC API call is made with\n    spurious data. On version v249 and older the effect is not an assert,\n    but stack overwriting, with the attacker controlled content. From\n    version v250 and newer this is not possible as the safety check causes\n    an assert instead. This IPC call was added in v239, so versions older\n    than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11\n    contain patches. No known workarounds are available.\n    https://www.cve.org/CVERecord?id=CVE-2026-29111\n\n- CVE-2026-40226:\n    In nspawn in systemd 233 through 259 before 260, an escape-to-host\n    action can occur via a crafted optional config file.\n    https://www.cve.org/CVERecord?id=CVE-2026-40226\n    https://github.com/systemd/systemd/security/advisories/GHSA-9mj4-rrc3-gjcx\n\nSigned-off-by: Titouan Christophe <titouan.christophe@mind.be>\n---\n package/systemd/systemd.hash | 2 +-\n package/systemd/systemd.mk   | 2 +-\n 2 files changed, 2 insertions(+), 2 deletions(-)",
    "diff": "diff --git a/package/systemd/systemd.hash b/package/systemd/systemd.hash\nindex d5a97ffcbd..e96d3ba7ad 100644\n--- a/package/systemd/systemd.hash\n+++ b/package/systemd/systemd.hash\n@@ -1,5 +1,5 @@\n # sha256 locally computed\n-sha256  5c95e54e555b21594ab11e76f91a092c6383553ed725292eb0a929bf2fe028ae  systemd-258.4.tar.gz\n+sha256  6bd311c25f00d634ae3b4544d582e27df0d4166e6ba3d403b18b3129d7f44cae  systemd-258.7.tar.gz\n sha256  ac4985facb553559981f507982444d779115e3e3a4c8b7847ae956198490c1b3  LICENSE.GPL2\n sha256  6d9bb3b7fc818a8facc4cc296060a0883fef8710d6498f86165335846e82ee9d  LICENSE.LGPL2.1\n sha256  c9e7bf5b7c243c719b8b43c36158effb9b54c5e80abc9d82e4b2d4b2a4aa64ad  LICENSES/alg-sha1-public-domain.txt\ndiff --git a/package/systemd/systemd.mk b/package/systemd/systemd.mk\nindex 4b488857fd..9ce4f8fef2 100644\n--- a/package/systemd/systemd.mk\n+++ b/package/systemd/systemd.mk\n@@ -19,7 +19,7 @@\n # - Diff sysusers.d with the previous version\n # - Diff factory/etc/nsswitch.conf with the previous version\n #   (details are often sprinkled around in README and manpages)\n-SYSTEMD_VERSION = 258.4\n+SYSTEMD_VERSION = 258.7\n SYSTEMD_SITE = $(call github,systemd,systemd,v$(SYSTEMD_VERSION))\n SYSTEMD_LICENSE = \\\n \tLGPL-2.1+, \\\n",
    "prefixes": []
}