get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/808347/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 808347,
    "url": "http://patchwork.ozlabs.org/api/patches/808347/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/ubuntu-kernel/patch/7ed2de01-4873-f3cb-7c5b-15a63097d1ed@canonical.com/",
    "project": {
        "id": 15,
        "url": "http://patchwork.ozlabs.org/api/projects/15/?format=api",
        "name": "Ubuntu Kernel",
        "link_name": "ubuntu-kernel",
        "list_id": "kernel-team.lists.ubuntu.com",
        "list_email": "kernel-team@lists.ubuntu.com",
        "web_url": null,
        "scm_url": null,
        "webscm_url": null,
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<7ed2de01-4873-f3cb-7c5b-15a63097d1ed@canonical.com>",
    "list_archive_url": null,
    "date": "2017-08-31T17:05:41",
    "name": "[Artful] UBUNTU: SAUCE: apparmor: fix apparmorfs DAC access, permissions",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "37989edaf6feb87c043df3ed243b8759aded8da9",
    "submitter": {
        "id": 3000,
        "url": "http://patchwork.ozlabs.org/api/people/3000/?format=api",
        "name": "John Johansen",
        "email": "john.johansen@canonical.com"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/ubuntu-kernel/patch/7ed2de01-4873-f3cb-7c5b-15a63097d1ed@canonical.com/mbox/",
    "series": [
        {
            "id": 884,
            "url": "http://patchwork.ozlabs.org/api/series/884/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/ubuntu-kernel/list/?series=884",
            "date": "2017-08-31T17:05:41",
            "name": "[Artful] UBUNTU: SAUCE: apparmor: fix apparmorfs DAC access, permissions",
            "version": 1,
            "mbox": "http://patchwork.ozlabs.org/series/884/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/808347/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/808347/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<kernel-team-bounces@lists.ubuntu.com>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@bilbo.ozlabs.org",
        "Authentication-Results": "ozlabs.org;\n\tspf=none (mailfrom) smtp.mailfrom=lists.ubuntu.com\n\t(client-ip=91.189.94.19; helo=huckleberry.canonical.com;\n\tenvelope-from=kernel-team-bounces@lists.ubuntu.com;\n\treceiver=<UNKNOWN>)",
        "Received": [
            "from huckleberry.canonical.com (huckleberry.canonical.com\n\t[91.189.94.19])\n\tby ozlabs.org (Postfix) with ESMTP id 3xjpfr6bvfz9sD5;\n\tFri,  1 Sep 2017 03:05:56 +1000 (AEST)",
            "from localhost ([127.0.0.1] helo=huckleberry.canonical.com)\n\tby huckleberry.canonical.com with esmtp (Exim 4.76)\n\t(envelope-from <kernel-team-bounces@lists.ubuntu.com>)\n\tid 1dnSuf-0007rc-Al; Thu, 31 Aug 2017 17:05:53 +0000",
            "from youngberry.canonical.com ([91.189.89.112])\n\tby huckleberry.canonical.com with esmtps\n\t(TLS1.0:RSA_AES_256_CBC_SHA1:32)\n\t(Exim 4.76) (envelope-from <john.johansen@canonical.com>)\n\tid 1dnSua-0007qN-35\n\tfor kernel-team@lists.ubuntu.com; Thu, 31 Aug 2017 17:05:48 +0000",
            "from static-50-53-50-149.bvtn.or.frontiernet.net ([50.53.50.149]\n\thelo=[10.8.192.6]) by youngberry.canonical.com with esmtpsa\n\t(TLS1.0:DHE_RSA_AES_128_CBC_SHA1:16)\n\t(Exim 4.76) (envelope-from <john.johansen@canonical.com>)\n\tid 1dnSuZ-0002tB-4a\n\tfor kernel-team@lists.ubuntu.com; Thu, 31 Aug 2017 17:05:47 +0000"
        ],
        "To": "Kernel team list <kernel-team@lists.ubuntu.com>",
        "From": "John Johansen <john.johansen@canonical.com>",
        "Subject": "[PATCH][Artful] UBUNTU: SAUCE: apparmor: fix apparmorfs DAC access, \n\tpermissions",
        "Organization": "Canonical",
        "Message-ID": "<7ed2de01-4873-f3cb-7c5b-15a63097d1ed@canonical.com>",
        "Date": "Thu, 31 Aug 2017 10:05:41 -0700",
        "User-Agent": "Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101\n\tThunderbird/52.2.1",
        "MIME-Version": "1.0",
        "Content-Language": "en-GB",
        "X-BeenThere": "kernel-team@lists.ubuntu.com",
        "X-Mailman-Version": "2.1.14",
        "Precedence": "list",
        "List-Id": "Kernel team discussions <kernel-team.lists.ubuntu.com>",
        "List-Unsubscribe": "<https://lists.ubuntu.com/mailman/options/kernel-team>,\n\t<mailto:kernel-team-request@lists.ubuntu.com?subject=unsubscribe>",
        "List-Archive": "<https://lists.ubuntu.com/archives/kernel-team>",
        "List-Post": "<mailto:kernel-team@lists.ubuntu.com>",
        "List-Help": "<mailto:kernel-team-request@lists.ubuntu.com?subject=help>",
        "List-Subscribe": "<https://lists.ubuntu.com/mailman/listinfo/kernel-team>,\n\t<mailto:kernel-team-request@lists.ubuntu.com?subject=subscribe>",
        "Content-Type": "text/plain; charset=\"us-ascii\"",
        "Content-Transfer-Encoding": "7bit",
        "Errors-To": "kernel-team-bounces@lists.ubuntu.com",
        "Sender": "kernel-team-bounces@lists.ubuntu.com"
    },
    "content": "The DAC access permissions for several apparmorfs files are wrong.\n\n.access - needs to be writable by all tasks to perform queries\nthe others in the set only provide a read fn so should be read only.\n\nWith policy namespace virtualization all apparmor needs to control\nthe permission and visibility checks directly which means DAC\naccess has to be allowed for all user, group, and other.\n\nBugLink: http://bugs.launchpad.net/bugs/1713103\nSigned-off-by: John Johansen <john.johansen@canonical.com>\n---\n security/apparmor/apparmorfs.c | 8 ++++----\n 1 file changed, 4 insertions(+), 4 deletions(-)",
    "diff": "diff --git a/security/apparmor/apparmorfs.c b/security/apparmor/apparmorfs.c\nindex 20cdb1c4b266..63a8a462fc96 100644\n--- a/security/apparmor/apparmorfs.c\n+++ b/security/apparmor/apparmorfs.c\n@@ -2221,12 +2221,12 @@ static struct aa_sfs_entry aa_sfs_entry_features[] = {\n };\n \n static struct aa_sfs_entry aa_sfs_entry_apparmor[] = {\n-\tAA_SFS_FILE_FOPS(\".access\", 0640, &aa_sfs_access),\n+\tAA_SFS_FILE_FOPS(\".access\", 0666, &aa_sfs_access),\n \tAA_SFS_FILE_FOPS(\".stacked\", 0444, &seq_ns_stacked_fops),\n \tAA_SFS_FILE_FOPS(\".ns_stacked\", 0444, &seq_ns_nsstacked_fops),\n-\tAA_SFS_FILE_FOPS(\".ns_level\", 0666, &seq_ns_level_fops),\n-\tAA_SFS_FILE_FOPS(\".ns_name\", 0640, &seq_ns_name_fops),\n-\tAA_SFS_FILE_FOPS(\"profiles\", 0440, &aa_sfs_profiles_fops),\n+\tAA_SFS_FILE_FOPS(\".ns_level\", 0444, &seq_ns_level_fops),\n+\tAA_SFS_FILE_FOPS(\".ns_name\", 0444, &seq_ns_name_fops),\n+\tAA_SFS_FILE_FOPS(\"profiles\", 0444, &aa_sfs_profiles_fops),\n \tAA_SFS_DIR(\"features\", aa_sfs_entry_features),\n \t{ }\n };\n",
    "prefixes": [
        "Artful"
    ]
}