Dataset Viewer
Auto-converted to Parquet Duplicate
messages
listlengths
3
3
metadata
dict
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "krb5-mini-2233-krb5-1.10-kpasswd_tcp.patch", "cve_id": "CVE-2013-1418", "package": "krb5-mini", "tier": "identical", "has_source_context": true, "context_tokens_est": 615, "context_files": 1, "license": "MIT", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "krb5-4431-krb5-1.12.2-CVE-2014-5353.patc", "cve_id": "CVE-2015-2698", "package": "krb5", "tier": "adapted", "has_source_context": false, "context_tokens_est": null, "context_files": null, "license": "MIT", "upstream_enriched": true, "upstream_commit": "d1f707024f1d0af6e54a18885322d70fa15ec4d3", "upstream_repo": "krb5/krb5" }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "gcc5-4931-gcc48-remove-mpfr-2.4.0-requir", "cve_id": "CVE-2015-5276", "package": "gcc5", "tier": "identical", "has_source_context": false, "context_tokens_est": null, "context_files": null, "license": "GPL-3.0-or-later", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "GraphicsMagick-5467-GraphicsMagick-CVE-2016-2317.p", "cve_id": "CVE-2014-9819", "package": "GraphicsMagick", "tier": "adapted", "has_source_context": false, "context_tokens_est": null, "context_files": null, "license": "MIT", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "glibc-utils-4690-nss-separate-state-getXXent.pa", "cve_id": "CVE-2014-9761", "package": "glibc-utils", "tier": "adapted", "has_source_context": true, "context_tokens_est": 2493, "context_files": 6, "license": "LGPL-2.1-or-later", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "libxml2-CVE-2024-34459-libxml2-CVE-2024-344", "cve_id": "CVE-2024-34459", "package": "libxml2", "tier": "adapted", "has_source_context": true, "context_tokens_est": 316, "context_files": 1, "license": "MIT", "upstream_enriched": true, "upstream_commit": "3ad7f81624572ebd5b9e6058c9f67d38207c10e2", "upstream_repo": "GNOME/libxml2" }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "glibc-testsuite-5158-nss-separate-state-getXXent.pa", "cve_id": "CVE-2016-3706", "package": "glibc-testsuite", "tier": "adapted", "has_source_context": true, "context_tokens_est": 3175, "context_files": 6, "license": "LGPL-2.1-or-later", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "nginx-4606-nginx-1.8.0-passenger-4.0.18.p", "cve_id": "CVE-2016-0747", "package": "nginx", "tier": "identical", "has_source_context": false, "context_tokens_est": null, "context_files": null, "license": "BSD-2-Clause", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "fontconfig-5559-0002-Add-metric-aliases-for-ad", "cve_id": "CVE-2016-5384", "package": "fontconfig", "tier": "identical", "has_source_context": false, "context_tokens_est": null, "context_files": null, "license": "MIT", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "openssh-askpass-gnome-5136-openssh-6.6p1-gssapimitm.patch", "cve_id": "CVE-2015-8325", "package": "openssh-askpass-gnome", "tier": "adapted", "has_source_context": false, "context_tokens_est": null, "context_files": null, "license": "BSD-2-Clause", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null }
End of preview. Expand in Data Studio

CVE Backport Dataset v4

Source-context-aware security patch backporting dataset for SUSE/openSUSE, with per-example license information.

Used to train cve-backport-qwen32b-phase3.

Files

File Examples Description
data/train-chatml.jsonl 1,883 Training split in ChatML format
data/eval-chatml.jsonl 148 Evaluation split in ChatML format

What this dataset contains

Each example is a real CVE backporting task: an upstream security patch paired with its SUSE-adapted backport. 42% of examples also include relevant source code context from the target package version.

The model input (user message) contains:

  • CVE identifier and description (from NVD)
  • Target package name-version (e.g. libxml2-2.9.1)
  • Files to modify (auto-detected from patch)
  • Target source code (function-level context from the older version, when available)
  • Upstream fix (unified diff)

The model output (assistant message) is the adapted SUSE backport patch in Index: quilt format.

Example structure

{
  "messages": [
    {"role": "system", "content": "You are a security patch backporting assistant..."},
    {"role": "user", "content": "## CVE: CVE-2022-29824\n...upstream patch...\nGenerate a backported patch..."},
    {"role": "assistant", "content": "Index: libxml2-2.9.1/buf.c\n===\n--- ..."}
  ],
  "metadata": {
    "id": "libxml2-1234-fix.patch",
    "cve_id": "CVE-2022-29824",
    "package": "libxml2",
    "tier": "adapted",
    "has_source_context": true,
    "context_tokens_est": 1200,
    "context_files": 2,
    "license": "MIT"
  }
}

Coverage

  • 90 packages across 200+ CVEs
  • Top packages: openssl (179), krb5 (127), krb5-mini (124), libxml2 (116), systemd (96)
  • 42% with source context from upstream tarballs

Source and licensing

Derived from publicly available patches in the openSUSE Open Build Service. Each example's metadata.license field indicates the license of the source package. CVE descriptions are from the National Vulnerability Database (public domain).

License distribution

License family Count Percentage
LGPL 507 25.0%
MIT 495 24.4%
GPL-3.x 189 9.3%
BSD 178 8.8%
GPL-2.x 163 8.0%
MPL 79 3.9%
Apache 32 1.6%
Other (OpenSSL, ImageMagick, Zlib, etc.) 388 19.1%

Intended use

Training models to assist with security patch backporting — adapting upstream CVE fixes for older SUSE/openSUSE package versions.

References

Downloads last month
14

Models trained or fine-tuned on anicka/cve-backport-v4-dataset