messages listlengths 3 3 | metadata dict |
|---|---|
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "krb5-mini-2233-krb5-1.10-kpasswd_tcp.patch",
"cve_id": "CVE-2013-1418",
"package": "krb5-mini",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "identical",
"has_source_context": true,
"license": "MIT",
"context_tokens_est": 615,
"context_files": 1
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "krb5-4431-krb5-1.12.2-CVE-2014-5353.patc",
"cve_id": "CVE-2015-2698",
"package": "krb5",
"upstream_enriched": true,
"upstream_commit": "d1f707024f1d0af6e54a18885322d70fa15ec4d3",
"upstream_repo": "krb5/krb5",
"tier": "adapted",
"has_source_context": false,
"license": "MIT",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "gcc5-4931-gcc48-remove-mpfr-2.4.0-requir",
"cve_id": "CVE-2015-5276",
"package": "gcc5",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "identical",
"has_source_context": false,
"license": "GPL-3.0-or-later",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "GraphicsMagick-5467-GraphicsMagick-CVE-2016-2317.p",
"cve_id": "CVE-2014-9819",
"package": "GraphicsMagick",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "adapted",
"has_source_context": false,
"license": "MIT",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "glibc-utils-4690-nss-separate-state-getXXent.pa",
"cve_id": "CVE-2014-9761",
"package": "glibc-utils",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "adapted",
"has_source_context": true,
"license": "LGPL-2.1-or-later",
"context_tokens_est": 2493,
"context_files": 6
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "libxml2-CVE-2024-34459-libxml2-CVE-2024-344",
"cve_id": "CVE-2024-34459",
"package": "libxml2",
"upstream_enriched": true,
"upstream_commit": "3ad7f81624572ebd5b9e6058c9f67d38207c10e2",
"upstream_repo": "GNOME/libxml2",
"tier": "adapted",
"has_source_context": true,
"license": "MIT",
"context_tokens_est": 316,
"context_files": 1
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "glibc-testsuite-5158-nss-separate-state-getXXent.pa",
"cve_id": "CVE-2016-3706",
"package": "glibc-testsuite",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "adapted",
"has_source_context": true,
"license": "LGPL-2.1-or-later",
"context_tokens_est": 3175,
"context_files": 6
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "nginx-4606-nginx-1.8.0-passenger-4.0.18.p",
"cve_id": "CVE-2016-0747",
"package": "nginx",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "identical",
"has_source_context": false,
"license": "BSD-2-Clause",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "fontconfig-5559-0002-Add-metric-aliases-for-ad",
"cve_id": "CVE-2016-5384",
"package": "fontconfig",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "identical",
"has_source_context": false,
"license": "MIT",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "openssh-askpass-gnome-5136-openssh-6.6p1-gssapimitm.patch",
"cve_id": "CVE-2015-8325",
"package": "openssh-askpass-gnome",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "adapted",
"has_source_context": false,
"license": "BSD-2-Clause",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "openssl-5042-openssl-CVE-2016-0798-101.patc",
"cve_id": "CVE-2016-2105",
"package": "openssl",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "adapted",
"has_source_context": true,
"license": "OpenSSL",
"context_tokens_est": 2501,
"context_files": 4
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "ghostscript-5881-CVE-2016-7979.patch",
"cve_id": "CVE-2013-5653",
"package": "ghostscript",
"upstream_enriched": true,
"upstream_commit": "875a0095f37626a721c7ff57d606a0f95af03913",
"upstream_repo": "ArtifexSoftware/ghostpdl",
"tier": "adapted",
"has_source_context": false,
"license": "AGPL-3.0-only",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "gcc5-4931-gcc-add-defaultsspec.diff",
"cve_id": "CVE-2015-5276",
"package": "gcc5",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "identical",
"has_source_context": false,
"license": "GPL-3.0-or-later",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "libjpeg-turbo-687-libjpeg-turbo-1.1.1-CVE-2012-2",
"cve_id": "CVE-2012-2806",
"package": "libjpeg-turbo",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "identical",
"has_source_context": false,
"license": "BSD-3-Clause",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "ghostscript-mini-5706-fix-mutex-crash.patch",
"cve_id": "CVE-2016-7978",
"package": "ghostscript-mini",
"upstream_enriched": true,
"upstream_commit": "444e0bf9c43bae0261660e6318ba0e514c18d41e",
"upstream_repo": "ArtifexSoftware/ghostpdl",
"tier": "adapted",
"has_source_context": true,
"license": "AGPL-3.0-only",
"context_tokens_est": 1423,
"context_files": 3
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "gcc5-testresults-4931-tls-no-direct.diff",
"cve_id": "CVE-2015-5276",
"package": "gcc5-testresults",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "identical",
"has_source_context": false,
"license": "GPL-3.0-or-later",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "rsync-5241-rsync-equivalent_of_CVE-2014-8",
"cve_id": "CVE-2014-9512",
"package": "rsync",
"upstream_enriched": true,
"upstream_commit": "eac858085e3ac94ec0ab5061d11f52652c90a869",
"upstream_repo": "RsyncProject/rsync",
"tier": "adapted",
"has_source_context": false,
"license": "GPL-3.0-or-later",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "krb5-4670-krb5-1.12.2-CVE-2014-5353.patc",
"cve_id": "CVE-2015-8629",
"package": "krb5",
"upstream_enriched": true,
"upstream_commit": "d1f707024f1d0af6e54a18885322d70fa15ec4d3",
"upstream_repo": "krb5/krb5",
"tier": "adapted",
"has_source_context": false,
"license": "MIT",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "krb5-4938-krb5-1.12-pam.patch",
"cve_id": "CVE-2016-3119",
"package": "krb5",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "adapted",
"has_source_context": false,
"license": "MIT",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "zlib-6007-zlib-format.patch",
"cve_id": "CVE-2016-9840",
"package": "zlib",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "identical",
"has_source_context": false,
"license": "Zlib",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "krb5-mini-4938-krb5-1.12-CVE-2014-4343-Fix-do",
"cve_id": "CVE-2016-3119",
"package": "krb5-mini",
"upstream_enriched": true,
"upstream_commit": "f18ddf5d82de0ab7591a36e465bc24225776940f",
"upstream_repo": "krb5/krb5",
"tier": "adapted",
"has_source_context": false,
"license": "MIT",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "glibc-utils-5322-resolv-mem-leak.patch",
"cve_id": "CVE-2016-3706",
"package": "glibc-utils",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "identical",
"has_source_context": true,
"license": "LGPL-2.1-or-later",
"context_tokens_est": 197,
"context_files": 1
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "nginx-1-387-nginx-CVE-2012-1180.patch",
"cve_id": "CVE-2012-1180",
"package": "nginx-1",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "identical",
"has_source_context": false,
"license": "BSD-2-Clause",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "gnutls-3193-gnutls-CVE-2015-0294.patch",
"cve_id": "CVE-2014-8564",
"package": "gnutls",
"upstream_enriched": true,
"upstream_commit": "6e76e9b9fa845b76b0b9a45f05f4b54a052578ff",
"upstream_repo": "gnutls/gnutls",
"tier": "adapted",
"has_source_context": true,
"license": "GPL-3.0-or-later AND LGPL-2.1-or-later",
"context_tokens_est": 548,
"context_files": 1
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "systemd-mini-2025-crypsetup-handle-nofail.patch",
"cve_id": "CVE-2013-4288",
"package": "systemd-mini",
"upstream_enriched": true,
"upstream_commit": "adc40dc2f670a6298cce918fb318ba6a4b80c306",
"upstream_repo": "systemd/systemd",
"tier": "adapted",
"has_source_context": false,
"license": "LGPL-2.1-or-later",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "krb5-mini-4431-krb5-1.12.2-CVE-2014-5353.patc",
"cve_id": "CVE-2015-2698",
"package": "krb5-mini",
"upstream_enriched": true,
"upstream_commit": "d1f707024f1d0af6e54a18885322d70fa15ec4d3",
"upstream_repo": "krb5/krb5",
"tier": "adapted",
"has_source_context": false,
"license": "MIT",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "cairo-4912-cairo-render-thin-lines.patch",
"cve_id": "CVE-2016-3190",
"package": "cairo",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "identical",
"has_source_context": false,
"license": "LGPL-2.1-or-later OR MPL-1.1",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "openssh-askpass-gnome-4526-openssh-6.6p1-audit6-server_ke",
"cve_id": "CVE-2016-0777",
"package": "openssh-askpass-gnome",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "adapted",
"has_source_context": false,
"license": "BSD-2-Clause",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "glibc-342-glibc-2.3.3-nscd-db-path.diff",
"cve_id": "CVE-2012-0864",
"package": "glibc",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "identical",
"has_source_context": true,
"license": "LGPL-2.1-or-later",
"context_tokens_est": 627,
"context_files": 1
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "postgresql93-5637-postgresql-var-run-socket.patc",
"cve_id": "CVE-2016-5423",
"package": "postgresql93",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "identical",
"has_source_context": true,
"license": "PostgreSQL",
"context_tokens_est": 2712,
"context_files": 4
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "libxml2-5040-0001-Fix-missing-entities-afte",
"cve_id": "CVE-2016-3627",
"package": "libxml2",
"upstream_enriched": true,
"upstream_commit": "72a46a519ce7326d9a00f0b6a7f2a8e958cd1675",
"upstream_repo": "GNOME/libxml2",
"tier": "adapted",
"has_source_context": true,
"license": "MIT",
"context_tokens_est": 16,
"context_files": 1
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "systemd-mini-2025-1001-Reinstate-TIMEOUT-handlin",
"cve_id": "CVE-2013-4288",
"package": "systemd-mini",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "identical",
"has_source_context": true,
"license": "LGPL-2.1-or-later",
"context_tokens_est": 3329,
"context_files": 3
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "systemd-2025-switch-root-try-pivot-root.pat",
"cve_id": "CVE-2013-4288",
"package": "systemd",
"upstream_enriched": true,
"upstream_commit": "891a4918ef75fa81e22691156c050d061bd53dd3",
"upstream_repo": "systemd/systemd",
"tier": "adapted",
"has_source_context": false,
"license": "LGPL-2.1-or-later",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "libpng12-4248-libpng12-CVE-2015-8126.patch",
"cve_id": "CVE-2015-7981",
"package": "libpng12",
"upstream_enriched": true,
"upstream_commit": "81f44665cce4cb1373f049a76f3904e981b7a766",
"upstream_repo": "glennrp/libpng",
"tier": "adapted",
"has_source_context": false,
"license": "Zlib",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "systemd-2025-do-not-make-sockets-dependent-",
"cve_id": "CVE-2013-4288",
"package": "systemd",
"upstream_enriched": true,
"upstream_commit": "7d0c710d72f8a6e5c6909c65700aa088c53aebc6",
"upstream_repo": "systemd/systemd",
"tier": "adapted",
"has_source_context": true,
"license": "LGPL-2.1-or-later",
"context_tokens_est": 129,
"context_files": 1
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "libxml2-1604-libxml2-CVE-2012-0841.patch",
"cve_id": "CVE-2013-1969",
"package": "libxml2",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "adapted",
"has_source_context": false,
"license": "MIT",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "systemd-2025-shutdown-improvements.patch",
"cve_id": "CVE-2013-4288",
"package": "systemd",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "adapted",
"has_source_context": true,
"license": "LGPL-2.1-or-later",
"context_tokens_est": 780,
"context_files": 1
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "freetype2-418-CVE-2012-1139.patch",
"cve_id": "CVE-2012-1138",
"package": "freetype2",
"upstream_enriched": true,
"upstream_commit": "6ac022dc750d95296a6f731b9594f2e751d997fa",
"upstream_repo": "freetype/freetype",
"tier": "adapted",
"has_source_context": true,
"license": "FTL AND GPL-2.0-only",
"context_tokens_est": 560,
"context_files": 1
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "dhcp-902-dhcp-4.2.4-ldap-0005-memleak-f",
"cve_id": "CVE-2012-3955",
"package": "dhcp",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "identical",
"has_source_context": false,
"license": "MPL-2.0",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "systemd-2025-journalctl-remove-leftover-mes",
"cve_id": "CVE-2013-4288",
"package": "systemd",
"upstream_enriched": true,
"upstream_commit": "db87a36e74ff26d1046a451ee086c9a2c4113d12",
"upstream_repo": "systemd/systemd",
"tier": "adapted",
"has_source_context": true,
"license": "LGPL-2.1-or-later",
"context_tokens_est": 208,
"context_files": 1
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "openssh-askpass-gnome-4527-openssh-6.6p1-audit6-server_ke",
"cve_id": "CVE-2016-0777",
"package": "openssh-askpass-gnome",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "adapted",
"has_source_context": false,
"license": "BSD-2-Clause",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "openssl-5042-0001-Fix-buffer-overrun-in-ASN",
"cve_id": "CVE-2016-2105",
"package": "openssl",
"upstream_enriched": true,
"upstream_commit": "697283ba418b21c4c0682d7050264b492e2ea4e2",
"upstream_repo": "openssl/openssl",
"tier": "adapted",
"has_source_context": true,
"license": "OpenSSL",
"context_tokens_est": 1661,
"context_files": 2
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "glibc-testsuite-5322-Avoid-deadlock-in-malloc-on-ba",
"cve_id": "CVE-2016-3706",
"package": "glibc-testsuite",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "adapted",
"has_source_context": true,
"license": "LGPL-2.1-or-later",
"context_tokens_est": 2587,
"context_files": 4
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "libgcrypt-5635-libgcrypt-fips_rsa_keygen.patc",
"cve_id": "CVE-2016-6313",
"package": "libgcrypt",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "adapted",
"has_source_context": true,
"license": "GPL-2.0-or-later AND LGPL-2.1-or-later AND GPL-3.0-or-later",
"context_tokens_est": 1098,
"context_files": 2
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "ImageMagick-5774-ImageMagick-CVE-2016-7514.patc",
"cve_id": "CVE-2016-8684",
"package": "ImageMagick",
"upstream_enriched": true,
"upstream_commit": "4b1fba0af7c54b9da3681b57087e370839e4ac7f",
"upstream_repo": "ImageMagick/ImageMagick",
"tier": "adapted",
"has_source_context": false,
"license": "ImageMagick",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "krb5-4168-0102-Fix-SPNEGO-context-aliasi",
"cve_id": "CVE-2015-2695",
"package": "krb5",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "adapted",
"has_source_context": true,
"license": "MIT",
"context_tokens_est": 522,
"context_files": 1
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "wireshark-3209-wireshark-1.2.0-geoip.patch",
"cve_id": "CVE-2014-8710",
"package": "wireshark",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "identical",
"has_source_context": false,
"license": "GPL-2.0-or-later AND GPL-3.0-or-later",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "krb5-4670-krb5-1.12-pam.patch",
"cve_id": "CVE-2015-8629",
"package": "krb5",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "adapted",
"has_source_context": false,
"license": "MIT",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "openssh-askpass-gnome-5597-openssh-6.6p1-audit6-server_ke",
"cve_id": "CVE-2016-6210",
"package": "openssh-askpass-gnome",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "adapted",
"has_source_context": false,
"license": "BSD-2-Clause",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "krb5-mini-4938-0100-Fix-build_principal-memor",
"cve_id": "CVE-2016-3119",
"package": "krb5-mini",
"upstream_enriched": true,
"upstream_commit": "f0c094a1b745d91ef2f9a4eae2149aac026a5789",
"upstream_repo": "krb5/krb5",
"tier": "adapted",
"has_source_context": false,
"license": "MIT",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "glibc-utils-4693-resolv-nameserver-handling.pat",
"cve_id": "CVE-2015-8779",
"package": "glibc-utils",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "adapted",
"has_source_context": true,
"license": "LGPL-2.1-or-later",
"context_tokens_est": 2168,
"context_files": 2
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "krb5-4938-0001-Fix-krb5_read_message-han",
"cve_id": "CVE-2016-3119",
"package": "krb5",
"upstream_enriched": true,
"upstream_commit": "102bb6ebf20f9174130c85c3b052ae104e5073ec",
"upstream_repo": "krb5/krb5",
"tier": "adapted",
"has_source_context": false,
"license": "MIT",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "coreutils-3827-coreutils-df-total-suppress-se",
"cve_id": "CVE-2015-4042",
"package": "coreutils",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "adapted",
"has_source_context": false,
"license": "GPL-3.0-or-later",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "openssl-5667-openssl-CVE-2016-2105.patch",
"cve_id": "CVE-2016-6302",
"package": "openssl",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "adapted",
"has_source_context": true,
"license": "OpenSSL",
"context_tokens_est": 741,
"context_files": 2
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "glibc-testsuite-5158-resolv-nameserver-handling.pat",
"cve_id": "CVE-2016-3706",
"package": "glibc-testsuite",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "adapted",
"has_source_context": true,
"license": "LGPL-2.1-or-later",
"context_tokens_est": 2168,
"context_files": 2
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "glibc-5158-resolv-nameserver-handling.pat",
"cve_id": "CVE-2016-3706",
"package": "glibc",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "adapted",
"has_source_context": true,
"license": "LGPL-2.1-or-later",
"context_tokens_est": 2168,
"context_files": 2
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "systemd-mini-2025-1011-libudev-avoid-leak-during",
"cve_id": "CVE-2013-4288",
"package": "systemd-mini",
"upstream_enriched": true,
"upstream_commit": "cf2292f5ac87087f57dbd632a25a332c9d194ebf",
"upstream_repo": "systemd/systemd",
"tier": "adapted",
"has_source_context": true,
"license": "LGPL-2.1-or-later",
"context_tokens_est": 408,
"context_files": 1
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "openssl-5650-openssl-CVE-2016-6306.patch",
"cve_id": "CVE-2016-6302",
"package": "openssl",
"upstream_enriched": true,
"upstream_commit": "ff553f837172ecb2b5c8eca257ec3c5619a4b299",
"upstream_repo": "openssl/openssl",
"tier": "adapted",
"has_source_context": true,
"license": "OpenSSL",
"context_tokens_est": 558,
"context_files": 1
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "openssl-5050-openssl-CVE-2015-3196.patch",
"cve_id": "CVE-2016-2105",
"package": "openssl",
"upstream_enriched": true,
"upstream_commit": "3c66a669dfc7b3792f7af0758ea26fe8502ce70c",
"upstream_repo": "openssl/openssl",
"tier": "adapted",
"has_source_context": true,
"license": "OpenSSL",
"context_tokens_est": 1525,
"context_files": 2
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "rsync-4076-rsync-equivalent_of_CVE-2014-8",
"cve_id": "CVE-2014-8242",
"package": "rsync",
"upstream_enriched": true,
"upstream_commit": "eac858085e3ac94ec0ab5061d11f52652c90a869",
"upstream_repo": "RsyncProject/rsync",
"tier": "adapted",
"has_source_context": false,
"license": "GPL-3.0-or-later",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "poppler-qt-5045-poppler-ligatures.patch",
"cve_id": "CVE-2015-8868",
"package": "poppler-qt",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "identical",
"has_source_context": false,
"license": "GPL-2.0-only OR GPL-3.0-only",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "glibc-testsuite-5322-resolv-nameserver-handling.pat",
"cve_id": "CVE-2016-3706",
"package": "glibc-testsuite",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "adapted",
"has_source_context": true,
"license": "LGPL-2.1-or-later",
"context_tokens_est": 2168,
"context_files": 2
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "dbus-1-1001-dbus-1.2.10-fd-limit-backport.",
"cve_id": "CVE-2008-4311",
"package": "dbus-1",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "identical",
"has_source_context": false,
"license": "AFL-2.1 OR GPL-2.0-or-later",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "file-2688-0001-off-by-one-in-out-of-boun",
"cve_id": "CVE-2013-7345",
"package": "file",
"upstream_enriched": true,
"upstream_commit": "70c65d2e1841491f59168db1f905e8b14083fb1c",
"upstream_repo": "file/file",
"tier": "adapted",
"has_source_context": false,
"license": "BSD-2-Clause",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "openssl-4352-0001-Axe-builtin-printf-implem",
"cve_id": "CVE-2015-3194",
"package": "openssl",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "adapted",
"has_source_context": true,
"license": "OpenSSL",
"context_tokens_est": 4006,
"context_files": 1
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "postgresql94-4741-postgresql-var-run-socket.patc",
"cve_id": "CVE-2007-4772",
"package": "postgresql94",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "identical",
"has_source_context": true,
"license": "PostgreSQL",
"context_tokens_est": 2712,
"context_files": 4
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "glibc-testsuite-4693-setlocale-directory-traversal.",
"cve_id": "CVE-2015-8779",
"package": "glibc-testsuite",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "adapted",
"has_source_context": true,
"license": "LGPL-2.1-or-later",
"context_tokens_est": 3232,
"context_files": 4
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "openssl-5050-openssl-1.0.1i-fipslocking.pat",
"cve_id": "CVE-2016-2105",
"package": "openssl",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "adapted",
"has_source_context": true,
"license": "OpenSSL",
"context_tokens_est": 1698,
"context_files": 3
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "glibc-5640-nss-dns-memleak.patch",
"cve_id": "CVE-2016-6323",
"package": "glibc",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "adapted",
"has_source_context": true,
"license": "LGPL-2.1-or-later",
"context_tokens_est": 3275,
"context_files": 7
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "krb5-5535-0100-Fix-build_principal-memor",
"cve_id": "CVE-2016-3120",
"package": "krb5",
"upstream_enriched": true,
"upstream_commit": "f0c094a1b745d91ef2f9a4eae2149aac026a5789",
"upstream_repo": "krb5/krb5",
"tier": "adapted",
"has_source_context": false,
"license": "MIT",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "krb5-4431-krb5-1.12.2-CVE-2014-5354.patc",
"cve_id": "CVE-2015-2698",
"package": "krb5",
"upstream_enriched": true,
"upstream_commit": "04038bf3633c4b909b5ded3072dc88c8c419bf16",
"upstream_repo": "krb5/krb5",
"tier": "adapted",
"has_source_context": false,
"license": "MIT",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "wireshark-5208-wireshark-1.2.0-geoip.patch",
"cve_id": "CVE-2016-5358",
"package": "wireshark",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "identical",
"has_source_context": false,
"license": "GPL-2.0-or-later AND GPL-3.0-or-later",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "openssl-5050-openssl-RSA_premaster_secret_i",
"cve_id": "CVE-2016-2105",
"package": "openssl",
"upstream_enriched": true,
"upstream_commit": "adb46dbc6dd7347750df2468c93e8c34bcb93a4b",
"upstream_repo": "openssl/openssl",
"tier": "adapted",
"has_source_context": true,
"license": "OpenSSL",
"context_tokens_est": 423,
"context_files": 1
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "mozilla-nss-5531-nss-uninitialized.patch",
"cve_id": "CVE-2016-6354",
"package": "mozilla-nss",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "identical",
"has_source_context": false,
"license": "MPL-2.0",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "systemd-2025-fix-logind-pty-seat.patch",
"cve_id": "CVE-2013-4288",
"package": "systemd",
"upstream_enriched": true,
"upstream_commit": "978cf3c75fbd94fd0e046206ada6169b35edd919",
"upstream_repo": "systemd/systemd",
"tier": "adapted",
"has_source_context": true,
"license": "LGPL-2.1-or-later",
"context_tokens_est": 712,
"context_files": 1
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "krb5-4431-krb5-1.12-CVE-2014-4343-Fix-do",
"cve_id": "CVE-2015-2698",
"package": "krb5",
"upstream_enriched": true,
"upstream_commit": "f18ddf5d82de0ab7591a36e465bc24225776940f",
"upstream_repo": "krb5/krb5",
"tier": "adapted",
"has_source_context": false,
"license": "MIT",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "openssl-4352-0002-dhparam-set-the-default-t",
"cve_id": "CVE-2015-3194",
"package": "openssl",
"upstream_enriched": true,
"upstream_commit": "8568170d774f02880eec6cad5512f555d0c83f65",
"upstream_repo": "openssl/openssl",
"tier": "adapted",
"has_source_context": true,
"license": "OpenSSL",
"context_tokens_est": 1941,
"context_files": 2
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "glibc-utils-5322-malloc-Fix-attached-thread-ref",
"cve_id": "CVE-2016-3706",
"package": "glibc-utils",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "adapted",
"has_source_context": true,
"license": "LGPL-2.1-or-later",
"context_tokens_est": 1890,
"context_files": 2
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "openssh-askpass-gnome-5597-openssh-6.6p1-seccomp_stat.pat",
"cve_id": "CVE-2016-6210",
"package": "openssh-askpass-gnome",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "identical",
"has_source_context": false,
"license": "BSD-2-Clause",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "curl-5786-curl-CVE-2014-3613.patch",
"cve_id": "CVE-2016-8618",
"package": "curl",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "adapted",
"has_source_context": false,
"license": "MIT",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "systemd-mini-2025-localectl-support-systems-with",
"cve_id": "CVE-2013-4288",
"package": "systemd-mini",
"upstream_enriched": true,
"upstream_commit": "17d33cecaa762f7e43200307328af5e9135e2091",
"upstream_repo": "systemd/systemd",
"tier": "adapted",
"has_source_context": true,
"license": "LGPL-2.1-or-later",
"context_tokens_est": 1014,
"context_files": 1
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "krb5-mini-4619-krb5-1.13-work-around-replay-c",
"cve_id": "CVE-2015-8629",
"package": "krb5-mini",
"upstream_enriched": true,
"upstream_commit": "c61e8c0c6ad5fda8d23dd896c4aed0ac5b470020",
"upstream_repo": "krb5/krb5",
"tier": "adapted",
"has_source_context": false,
"license": "MIT",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "ghostscript-library-883-ghostscript-9.00-echogs.patch",
"cve_id": "CVE-2012-4405",
"package": "ghostscript-library",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "identical",
"has_source_context": false,
"license": "AGPL-3.0-only",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "libssh-1119-0008-CVE-2012-4559-Ensure-that",
"cve_id": "CVE-2012-4561",
"package": "libssh",
"upstream_enriched": true,
"upstream_commit": "6236001ff4f9017c9f842d6548baba9760c95f5c",
"upstream_repo": "libssh/libssh-mirror",
"tier": "adapted",
"has_source_context": false,
"license": "LGPL-2.1-or-later",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "libgcrypt-4975-libgcrypt-fips_KAT_keygen_test",
"cve_id": "CVE-2015-7511",
"package": "libgcrypt",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "adapted",
"has_source_context": true,
"license": "GPL-2.0-or-later AND LGPL-2.1-or-later AND GPL-3.0-or-later",
"context_tokens_est": 376,
"context_files": 1
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "systemd-mini-2025-logind-capability-making-seats",
"cve_id": "CVE-2013-4288",
"package": "systemd-mini",
"upstream_enriched": true,
"upstream_commit": "955f9bde9ba6d9f0a7364d5cb7c0cee951d5caab",
"upstream_repo": "systemd/systemd",
"tier": "adapted",
"has_source_context": true,
"license": "LGPL-2.1-or-later",
"context_tokens_est": 1799,
"context_files": 2
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "coreutils-1251-coreutils-getaddrinfo.patch",
"cve_id": "CVE-2013-0221",
"package": "coreutils",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "identical",
"has_source_context": false,
"license": "GPL-3.0-or-later",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "ghostscript-5881-CVE-2013-5653.patch",
"cve_id": "CVE-2013-5653",
"package": "ghostscript",
"upstream_enriched": true,
"upstream_commit": "ab109aaeb3ddba59518b036fb288402a65cf7ce8",
"upstream_repo": "ArtifexSoftware/ghostpdl",
"tier": "adapted",
"has_source_context": false,
"license": "AGPL-3.0-only",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "libgcrypt-4975-libgcrypt-fips_run_selftest_at",
"cve_id": "CVE-2015-7511",
"package": "libgcrypt",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "identical",
"has_source_context": true,
"license": "GPL-2.0-or-later AND LGPL-2.1-or-later AND GPL-3.0-or-later",
"context_tokens_est": 1786,
"context_files": 2
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "openssl-5050-0001-Taking-only-the-struct-ch",
"cve_id": "CVE-2016-2105",
"package": "openssl",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "adapted",
"has_source_context": false,
"license": "OpenSSL",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "lighttpd-255-lighttpd-1.4.30_head_fixes.pat",
"cve_id": "CVE-2011-4362",
"package": "lighttpd",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "identical",
"has_source_context": true,
"license": "BSD-3-Clause",
"context_tokens_est": 728,
"context_files": 2
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "ghostscript-mini-5881-CVE-2013-5653.patch",
"cve_id": "CVE-2013-5653",
"package": "ghostscript-mini",
"upstream_enriched": true,
"upstream_commit": "ab109aaeb3ddba59518b036fb288402a65cf7ce8",
"upstream_repo": "ArtifexSoftware/ghostpdl",
"tier": "adapted",
"has_source_context": false,
"license": "AGPL-3.0-only",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "systemd-2026-fix-kill-session-crash.patch",
"cve_id": "CVE-2013-4288",
"package": "systemd",
"upstream_enriched": true,
"upstream_commit": "cc1368e3b3585ab822d76e00945ed4c064047530",
"upstream_repo": "systemd/systemd",
"tier": "adapted",
"has_source_context": false,
"license": "LGPL-2.1-or-later",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "openssl-5667-openssl-CVE-2016-6302.patch",
"cve_id": "CVE-2016-6302",
"package": "openssl",
"upstream_enriched": true,
"upstream_commit": "baaabfd8fdcec04a691695fad9a664bea43202b6",
"upstream_repo": "openssl/openssl",
"tier": "adapted",
"has_source_context": true,
"license": "OpenSSL",
"context_tokens_est": 735,
"context_files": 1
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "libxml2-1859-libxml2-CVE-2012-5134.patch",
"cve_id": "CVE-2013-2877",
"package": "libxml2",
"upstream_enriched": true,
"upstream_commit": "6a36fbe3b3e001a8a840b5c1fdd81cefc9947f0d",
"upstream_repo": "GNOME/libxml2",
"tier": "adapted",
"has_source_context": true,
"license": "MIT",
"context_tokens_est": 659,
"context_files": 1
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "krb5-4938-0103-Fix-IAKERB-context-export",
"cve_id": "CVE-2016-3119",
"package": "krb5",
"upstream_enriched": true,
"upstream_commit": "3db8dfec1ef50ddd78d6ba9503185995876a39fd",
"upstream_repo": "krb5/krb5",
"tier": "adapted",
"has_source_context": false,
"license": "MIT",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "krb5-4670-0105-Fix-leaks-in-kadmin-serve",
"cve_id": "CVE-2015-8629",
"package": "krb5",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "adapted",
"has_source_context": false,
"license": "MIT",
"context_tokens_est": null,
"context_files": null
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "freetype2-1225-CVE-2012-1143.patch",
"cve_id": "CVE-2012-5669",
"package": "freetype2",
"upstream_enriched": true,
"upstream_commit": "ba67957d5ead443f4b6b31805d6e780d54361ca4",
"upstream_repo": "freetype/freetype",
"tier": "adapted",
"has_source_context": true,
"license": "FTL AND GPL-2.0-only",
"context_tokens_est": 1445,
"context_files": 1
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "glibc-testsuite-5158-reinitialize-dl_load_write_loc",
"cve_id": "CVE-2016-3706",
"package": "glibc-testsuite",
"upstream_enriched": null,
"upstream_commit": null,
"upstream_repo": null,
"tier": "identical",
"has_source_context": true,
"license": "LGPL-2.1-or-later",
"context_tokens_est": 673,
"context_files": 1
} |
[
{
"role": "system",
"content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i... | {
"id": "systemd-mini-2025-fix-dbus-crash.patch",
"cve_id": "CVE-2013-4288",
"package": "systemd-mini",
"upstream_enriched": true,
"upstream_commit": "645a9e5a2bbb06464a3fba1a3501e9d79e5bbad8",
"upstream_repo": "systemd/systemd",
"tier": "adapted",
"has_source_context": true,
"license": "LGPL-2.1-or-later",
"context_tokens_est": 161,
"context_files": 1
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.