messages listlengths 3 3 | metadata dict |
|---|---|
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "krb5-mini-2233-krb5-1.10-kpasswd_tcp.patch",
"cve_id": "CVE-2013-1418",
"package": "krb5-mini",
"tier": "identical",
"has_source_context": true,
"context_tokens_est": 615,
"context_files": 1,
"license": "MIT",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "krb5-4431-krb5-1.12.2-CVE-2014-5353.patc",
"cve_id": "CVE-2015-2698",
"package": "krb5",
"tier": "adapted",
"has_source_context": false,
"context_tokens_est": null,
"context_files": null,
"license": "MIT",
"upstream_enriched": true,
"upstream_commit": "d1f707024f1d0af6e54a18885322d70fa15ec4d3",
"upstream_repo": "krb5/krb5"
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "gcc5-4931-gcc48-remove-mpfr-2.4.0-requir",
"cve_id": "CVE-2015-5276",
"package": "gcc5",
"tier": "identical",
"has_source_context": false,
"context_tokens_est": null,
"context_files": null,
"license": "GPL-3.0-or-later",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "GraphicsMagick-5467-GraphicsMagick-CVE-2016-2317.p",
"cve_id": "CVE-2014-9819",
"package": "GraphicsMagick",
"tier": "adapted",
"has_source_context": false,
"context_tokens_est": null,
"context_files": null,
"license": "MIT",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "glibc-utils-4690-nss-separate-state-getXXent.pa",
"cve_id": "CVE-2014-9761",
"package": "glibc-utils",
"tier": "adapted",
"has_source_context": true,
"context_tokens_est": 2493,
"context_files": 6,
"license": "LGPL-2.1-or-later",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "libxml2-CVE-2024-34459-libxml2-CVE-2024-344",
"cve_id": "CVE-2024-34459",
"package": "libxml2",
"tier": "adapted",
"has_source_context": true,
"context_tokens_est": 316,
"context_files": 1,
"license": "MIT",
"upstream_enriched": true,
"upstream_commit": "3ad7f81624572ebd5b9e6058c9f67d38207c10e2",
"upstream_repo": "GNOME/libxml2"
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "glibc-testsuite-5158-nss-separate-state-getXXent.pa",
"cve_id": "CVE-2016-3706",
"package": "glibc-testsuite",
"tier": "adapted",
"has_source_context": true,
"context_tokens_est": 3175,
"context_files": 6,
"license": "LGPL-2.1-or-later",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "nginx-4606-nginx-1.8.0-passenger-4.0.18.p",
"cve_id": "CVE-2016-0747",
"package": "nginx",
"tier": "identical",
"has_source_context": false,
"context_tokens_est": null,
"context_files": null,
"license": "BSD-2-Clause",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "fontconfig-5559-0002-Add-metric-aliases-for-ad",
"cve_id": "CVE-2016-5384",
"package": "fontconfig",
"tier": "identical",
"has_source_context": false,
"context_tokens_est": null,
"context_files": null,
"license": "MIT",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "openssh-askpass-gnome-5136-openssh-6.6p1-gssapimitm.patch",
"cve_id": "CVE-2015-8325",
"package": "openssh-askpass-gnome",
"tier": "adapted",
"has_source_context": false,
"context_tokens_est": null,
"context_files": null,
"license": "BSD-2-Clause",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null
} |
Note: A newer, larger dataset is available: anicka/cve-backport-codegen-dataset (17,007 per-hunk code-generation examples). The newer dataset uses a code-generation format instead of direct patch generation, achieving 91% recall vs ~50% with this dataset's format. The corresponding model is anicka/cve-backport-codegen-qwen25-32b-v1.
CVE Backport Dataset v4
Source-context-aware security patch backporting dataset for openSUSE, with per-example license information.
Used to train cve-backport-qwen32b-phase3.
Files
| File | Examples | Description |
|---|---|---|
data/train-chatml.jsonl |
1,883 | Training split in ChatML format |
data/eval-chatml.jsonl |
148 | Evaluation split in ChatML format |
What this dataset contains
Each example is a real CVE backporting task: an upstream security patch paired with its adapted backport. 42% of examples also include relevant source code context from the target package version.
The model input (user message) contains:
- CVE identifier and description (from NVD)
- Target package name-version (e.g.
libxml2-2.9.1) - Files to modify (auto-detected from patch)
- Target source code (function-level context from the older version, when available)
- Upstream fix (unified diff)
The model output (assistant message) is the adapted backport patch in Index: quilt format.
Example structure
{
"messages": [
{"role": "system", "content": "You are a security patch backporting assistant..."},
{"role": "user", "content": "## CVE: CVE-2022-29824\n...upstream patch...\nGenerate a backported patch..."},
{"role": "assistant", "content": "Index: libxml2-2.9.1/buf.c\n===\n--- ..."}
],
"metadata": {
"id": "libxml2-1234-fix.patch",
"cve_id": "CVE-2022-29824",
"package": "libxml2",
"tier": "adapted",
"has_source_context": true,
"context_tokens_est": 1200,
"context_files": 2,
"license": "MIT"
}
}
Coverage
- 90 packages across 200+ CVEs
- Top packages: openssl (179), krb5 (127), krb5-mini (124), libxml2 (116), systemd (96)
- 42% with source context from upstream tarballs
Source and licensing
Derived from publicly available patches in the openSUSE Open Build Service. Each example's metadata.license field indicates the license of the source package. CVE descriptions are from the National Vulnerability Database (public domain).
License distribution
| License family | Count | Percentage |
|---|---|---|
| LGPL | 507 | 25.0% |
| MIT | 495 | 24.4% |
| GPL-3.x | 189 | 9.3% |
| BSD | 178 | 8.8% |
| GPL-2.x | 163 | 8.0% |
| MPL | 79 | 3.9% |
| Apache | 32 | 1.6% |
| Other (OpenSSL, ImageMagick, Zlib, etc.) | 388 | 19.1% |
Intended use
Training models to assist with security patch backporting — adapting upstream CVE fixes for older openSUSE package versions.
References
- cve-backport-tool — CLI inference tool
- cve-backport-codegen-qwen25-32b-v1 — latest trained model
- openSUSE Open Build Service
- Downloads last month
- 25