messages listlengths 3 3 | metadata dict |
|---|---|
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "krb5-mini-2233-krb5-1.10-kpasswd_tcp.patch",
"cve_id": "CVE-2013-1418",
"package": "krb5-mini",
"tier": "identical",
"has_source_context": true,
"context_tokens_est": 615,
"context_files": 1,
"license": "MIT",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "krb5-4431-krb5-1.12.2-CVE-2014-5353.patc",
"cve_id": "CVE-2015-2698",
"package": "krb5",
"tier": "adapted",
"has_source_context": false,
"context_tokens_est": null,
"context_files": null,
"license": "MIT",
"upstream_enriched": true,
"upstream_commit": "d1f707024f1d0af6e54a18885322d70fa15ec4d3",
"upstream_repo": "krb5/krb5"
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "gcc5-4931-gcc48-remove-mpfr-2.4.0-requir",
"cve_id": "CVE-2015-5276",
"package": "gcc5",
"tier": "identical",
"has_source_context": false,
"context_tokens_est": null,
"context_files": null,
"license": "GPL-3.0-or-later",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "GraphicsMagick-5467-GraphicsMagick-CVE-2016-2317.p",
"cve_id": "CVE-2014-9819",
"package": "GraphicsMagick",
"tier": "adapted",
"has_source_context": false,
"context_tokens_est": null,
"context_files": null,
"license": "MIT",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "glibc-utils-4690-nss-separate-state-getXXent.pa",
"cve_id": "CVE-2014-9761",
"package": "glibc-utils",
"tier": "adapted",
"has_source_context": true,
"context_tokens_est": 2493,
"context_files": 6,
"license": "LGPL-2.1-or-later",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "libxml2-CVE-2024-34459-libxml2-CVE-2024-344",
"cve_id": "CVE-2024-34459",
"package": "libxml2",
"tier": "adapted",
"has_source_context": true,
"context_tokens_est": 316,
"context_files": 1,
"license": "MIT",
"upstream_enriched": true,
"upstream_commit": "3ad7f81624572ebd5b9e6058c9f67d38207c10e2",
"upstream_repo": "GNOME/libxml2"
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "glibc-testsuite-5158-nss-separate-state-getXXent.pa",
"cve_id": "CVE-2016-3706",
"package": "glibc-testsuite",
"tier": "adapted",
"has_source_context": true,
"context_tokens_est": 3175,
"context_files": 6,
"license": "LGPL-2.1-or-later",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "nginx-4606-nginx-1.8.0-passenger-4.0.18.p",
"cve_id": "CVE-2016-0747",
"package": "nginx",
"tier": "identical",
"has_source_context": false,
"context_tokens_est": null,
"context_files": null,
"license": "BSD-2-Clause",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "fontconfig-5559-0002-Add-metric-aliases-for-ad",
"cve_id": "CVE-2016-5384",
"package": "fontconfig",
"tier": "identical",
"has_source_context": false,
"context_tokens_est": null,
"context_files": null,
"license": "MIT",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "openssh-askpass-gnome-5136-openssh-6.6p1-gssapimitm.patch",
"cve_id": "CVE-2015-8325",
"package": "openssh-askpass-gnome",
"tier": "adapted",
"has_source_context": false,
"context_tokens_est": null,
"context_files": null,
"license": "BSD-2-Clause",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null
} |
CVE Backport Dataset v4
Source-context-aware security patch backporting dataset for SUSE/openSUSE, with per-example license information.
Used to train cve-backport-qwen32b-phase3.
Files
| File | Examples | Description |
|---|---|---|
data/train-chatml.jsonl |
1,883 | Training split in ChatML format |
data/eval-chatml.jsonl |
148 | Evaluation split in ChatML format |
What this dataset contains
Each example is a real CVE backporting task: an upstream security patch paired with its SUSE-adapted backport. 42% of examples also include relevant source code context from the target package version.
The model input (user message) contains:
- CVE identifier and description (from NVD)
- Target package name-version (e.g.
libxml2-2.9.1) - Files to modify (auto-detected from patch)
- Target source code (function-level context from the older version, when available)
- Upstream fix (unified diff)
The model output (assistant message) is the adapted SUSE backport patch in Index: quilt format.
Example structure
{
"messages": [
{"role": "system", "content": "You are a security patch backporting assistant..."},
{"role": "user", "content": "## CVE: CVE-2022-29824\n...upstream patch...\nGenerate a backported patch..."},
{"role": "assistant", "content": "Index: libxml2-2.9.1/buf.c\n===\n--- ..."}
],
"metadata": {
"id": "libxml2-1234-fix.patch",
"cve_id": "CVE-2022-29824",
"package": "libxml2",
"tier": "adapted",
"has_source_context": true,
"context_tokens_est": 1200,
"context_files": 2,
"license": "MIT"
}
}
Coverage
- 90 packages across 200+ CVEs
- Top packages: openssl (179), krb5 (127), krb5-mini (124), libxml2 (116), systemd (96)
- 42% with source context from upstream tarballs
Source and licensing
Derived from publicly available patches in the openSUSE Open Build Service. Each example's metadata.license field indicates the license of the source package. CVE descriptions are from the National Vulnerability Database (public domain).
License distribution
| License family | Count | Percentage |
|---|---|---|
| LGPL | 507 | 25.0% |
| MIT | 495 | 24.4% |
| GPL-3.x | 189 | 9.3% |
| BSD | 178 | 8.8% |
| GPL-2.x | 163 | 8.0% |
| MPL | 79 | 3.9% |
| Apache | 32 | 1.6% |
| Other (OpenSSL, ImageMagick, Zlib, etc.) | 388 | 19.1% |
Intended use
Training models to assist with security patch backporting — adapting upstream CVE fixes for older SUSE/openSUSE package versions.
References
- cve-backport-tool — CLI inference tool
- cve-backport-qwen32b-phase3 — trained model
- openSUSE Open Build Service
- Downloads last month
- 14