messages
listlengths
3
3
metadata
dict
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "krb5-mini-2233-krb5-1.10-kpasswd_tcp.patch", "cve_id": "CVE-2013-1418", "package": "krb5-mini", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "identical", "has_source_context": true, "license": "MIT", "context_tokens_est": 615, "context_files": 1 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "krb5-4431-krb5-1.12.2-CVE-2014-5353.patc", "cve_id": "CVE-2015-2698", "package": "krb5", "upstream_enriched": true, "upstream_commit": "d1f707024f1d0af6e54a18885322d70fa15ec4d3", "upstream_repo": "krb5/krb5", "tier": "adapted", "has_source_context": false, "license": "MIT", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "gcc5-4931-gcc48-remove-mpfr-2.4.0-requir", "cve_id": "CVE-2015-5276", "package": "gcc5", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "identical", "has_source_context": false, "license": "GPL-3.0-or-later", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "GraphicsMagick-5467-GraphicsMagick-CVE-2016-2317.p", "cve_id": "CVE-2014-9819", "package": "GraphicsMagick", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "adapted", "has_source_context": false, "license": "MIT", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "glibc-utils-4690-nss-separate-state-getXXent.pa", "cve_id": "CVE-2014-9761", "package": "glibc-utils", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "adapted", "has_source_context": true, "license": "LGPL-2.1-or-later", "context_tokens_est": 2493, "context_files": 6 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "libxml2-CVE-2024-34459-libxml2-CVE-2024-344", "cve_id": "CVE-2024-34459", "package": "libxml2", "upstream_enriched": true, "upstream_commit": "3ad7f81624572ebd5b9e6058c9f67d38207c10e2", "upstream_repo": "GNOME/libxml2", "tier": "adapted", "has_source_context": true, "license": "MIT", "context_tokens_est": 316, "context_files": 1 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "glibc-testsuite-5158-nss-separate-state-getXXent.pa", "cve_id": "CVE-2016-3706", "package": "glibc-testsuite", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "adapted", "has_source_context": true, "license": "LGPL-2.1-or-later", "context_tokens_est": 3175, "context_files": 6 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "nginx-4606-nginx-1.8.0-passenger-4.0.18.p", "cve_id": "CVE-2016-0747", "package": "nginx", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "identical", "has_source_context": false, "license": "BSD-2-Clause", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "fontconfig-5559-0002-Add-metric-aliases-for-ad", "cve_id": "CVE-2016-5384", "package": "fontconfig", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "identical", "has_source_context": false, "license": "MIT", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "openssh-askpass-gnome-5136-openssh-6.6p1-gssapimitm.patch", "cve_id": "CVE-2015-8325", "package": "openssh-askpass-gnome", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "adapted", "has_source_context": false, "license": "BSD-2-Clause", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "openssl-5042-openssl-CVE-2016-0798-101.patc", "cve_id": "CVE-2016-2105", "package": "openssl", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "adapted", "has_source_context": true, "license": "OpenSSL", "context_tokens_est": 2501, "context_files": 4 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "ghostscript-5881-CVE-2016-7979.patch", "cve_id": "CVE-2013-5653", "package": "ghostscript", "upstream_enriched": true, "upstream_commit": "875a0095f37626a721c7ff57d606a0f95af03913", "upstream_repo": "ArtifexSoftware/ghostpdl", "tier": "adapted", "has_source_context": false, "license": "AGPL-3.0-only", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "gcc5-4931-gcc-add-defaultsspec.diff", "cve_id": "CVE-2015-5276", "package": "gcc5", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "identical", "has_source_context": false, "license": "GPL-3.0-or-later", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "libjpeg-turbo-687-libjpeg-turbo-1.1.1-CVE-2012-2", "cve_id": "CVE-2012-2806", "package": "libjpeg-turbo", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "identical", "has_source_context": false, "license": "BSD-3-Clause", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "ghostscript-mini-5706-fix-mutex-crash.patch", "cve_id": "CVE-2016-7978", "package": "ghostscript-mini", "upstream_enriched": true, "upstream_commit": "444e0bf9c43bae0261660e6318ba0e514c18d41e", "upstream_repo": "ArtifexSoftware/ghostpdl", "tier": "adapted", "has_source_context": true, "license": "AGPL-3.0-only", "context_tokens_est": 1423, "context_files": 3 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "gcc5-testresults-4931-tls-no-direct.diff", "cve_id": "CVE-2015-5276", "package": "gcc5-testresults", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "identical", "has_source_context": false, "license": "GPL-3.0-or-later", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "rsync-5241-rsync-equivalent_of_CVE-2014-8", "cve_id": "CVE-2014-9512", "package": "rsync", "upstream_enriched": true, "upstream_commit": "eac858085e3ac94ec0ab5061d11f52652c90a869", "upstream_repo": "RsyncProject/rsync", "tier": "adapted", "has_source_context": false, "license": "GPL-3.0-or-later", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "krb5-4670-krb5-1.12.2-CVE-2014-5353.patc", "cve_id": "CVE-2015-8629", "package": "krb5", "upstream_enriched": true, "upstream_commit": "d1f707024f1d0af6e54a18885322d70fa15ec4d3", "upstream_repo": "krb5/krb5", "tier": "adapted", "has_source_context": false, "license": "MIT", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "krb5-4938-krb5-1.12-pam.patch", "cve_id": "CVE-2016-3119", "package": "krb5", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "adapted", "has_source_context": false, "license": "MIT", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "zlib-6007-zlib-format.patch", "cve_id": "CVE-2016-9840", "package": "zlib", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "identical", "has_source_context": false, "license": "Zlib", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "krb5-mini-4938-krb5-1.12-CVE-2014-4343-Fix-do", "cve_id": "CVE-2016-3119", "package": "krb5-mini", "upstream_enriched": true, "upstream_commit": "f18ddf5d82de0ab7591a36e465bc24225776940f", "upstream_repo": "krb5/krb5", "tier": "adapted", "has_source_context": false, "license": "MIT", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "glibc-utils-5322-resolv-mem-leak.patch", "cve_id": "CVE-2016-3706", "package": "glibc-utils", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "identical", "has_source_context": true, "license": "LGPL-2.1-or-later", "context_tokens_est": 197, "context_files": 1 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "nginx-1-387-nginx-CVE-2012-1180.patch", "cve_id": "CVE-2012-1180", "package": "nginx-1", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "identical", "has_source_context": false, "license": "BSD-2-Clause", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "gnutls-3193-gnutls-CVE-2015-0294.patch", "cve_id": "CVE-2014-8564", "package": "gnutls", "upstream_enriched": true, "upstream_commit": "6e76e9b9fa845b76b0b9a45f05f4b54a052578ff", "upstream_repo": "gnutls/gnutls", "tier": "adapted", "has_source_context": true, "license": "GPL-3.0-or-later AND LGPL-2.1-or-later", "context_tokens_est": 548, "context_files": 1 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "systemd-mini-2025-crypsetup-handle-nofail.patch", "cve_id": "CVE-2013-4288", "package": "systemd-mini", "upstream_enriched": true, "upstream_commit": "adc40dc2f670a6298cce918fb318ba6a4b80c306", "upstream_repo": "systemd/systemd", "tier": "adapted", "has_source_context": false, "license": "LGPL-2.1-or-later", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "krb5-mini-4431-krb5-1.12.2-CVE-2014-5353.patc", "cve_id": "CVE-2015-2698", "package": "krb5-mini", "upstream_enriched": true, "upstream_commit": "d1f707024f1d0af6e54a18885322d70fa15ec4d3", "upstream_repo": "krb5/krb5", "tier": "adapted", "has_source_context": false, "license": "MIT", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "cairo-4912-cairo-render-thin-lines.patch", "cve_id": "CVE-2016-3190", "package": "cairo", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "identical", "has_source_context": false, "license": "LGPL-2.1-or-later OR MPL-1.1", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "openssh-askpass-gnome-4526-openssh-6.6p1-audit6-server_ke", "cve_id": "CVE-2016-0777", "package": "openssh-askpass-gnome", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "adapted", "has_source_context": false, "license": "BSD-2-Clause", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "glibc-342-glibc-2.3.3-nscd-db-path.diff", "cve_id": "CVE-2012-0864", "package": "glibc", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "identical", "has_source_context": true, "license": "LGPL-2.1-or-later", "context_tokens_est": 627, "context_files": 1 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "postgresql93-5637-postgresql-var-run-socket.patc", "cve_id": "CVE-2016-5423", "package": "postgresql93", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "identical", "has_source_context": true, "license": "PostgreSQL", "context_tokens_est": 2712, "context_files": 4 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "libxml2-5040-0001-Fix-missing-entities-afte", "cve_id": "CVE-2016-3627", "package": "libxml2", "upstream_enriched": true, "upstream_commit": "72a46a519ce7326d9a00f0b6a7f2a8e958cd1675", "upstream_repo": "GNOME/libxml2", "tier": "adapted", "has_source_context": true, "license": "MIT", "context_tokens_est": 16, "context_files": 1 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "systemd-mini-2025-1001-Reinstate-TIMEOUT-handlin", "cve_id": "CVE-2013-4288", "package": "systemd-mini", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "identical", "has_source_context": true, "license": "LGPL-2.1-or-later", "context_tokens_est": 3329, "context_files": 3 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "systemd-2025-switch-root-try-pivot-root.pat", "cve_id": "CVE-2013-4288", "package": "systemd", "upstream_enriched": true, "upstream_commit": "891a4918ef75fa81e22691156c050d061bd53dd3", "upstream_repo": "systemd/systemd", "tier": "adapted", "has_source_context": false, "license": "LGPL-2.1-or-later", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "libpng12-4248-libpng12-CVE-2015-8126.patch", "cve_id": "CVE-2015-7981", "package": "libpng12", "upstream_enriched": true, "upstream_commit": "81f44665cce4cb1373f049a76f3904e981b7a766", "upstream_repo": "glennrp/libpng", "tier": "adapted", "has_source_context": false, "license": "Zlib", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "systemd-2025-do-not-make-sockets-dependent-", "cve_id": "CVE-2013-4288", "package": "systemd", "upstream_enriched": true, "upstream_commit": "7d0c710d72f8a6e5c6909c65700aa088c53aebc6", "upstream_repo": "systemd/systemd", "tier": "adapted", "has_source_context": true, "license": "LGPL-2.1-or-later", "context_tokens_est": 129, "context_files": 1 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "libxml2-1604-libxml2-CVE-2012-0841.patch", "cve_id": "CVE-2013-1969", "package": "libxml2", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "adapted", "has_source_context": false, "license": "MIT", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "systemd-2025-shutdown-improvements.patch", "cve_id": "CVE-2013-4288", "package": "systemd", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "adapted", "has_source_context": true, "license": "LGPL-2.1-or-later", "context_tokens_est": 780, "context_files": 1 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "freetype2-418-CVE-2012-1139.patch", "cve_id": "CVE-2012-1138", "package": "freetype2", "upstream_enriched": true, "upstream_commit": "6ac022dc750d95296a6f731b9594f2e751d997fa", "upstream_repo": "freetype/freetype", "tier": "adapted", "has_source_context": true, "license": "FTL AND GPL-2.0-only", "context_tokens_est": 560, "context_files": 1 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "dhcp-902-dhcp-4.2.4-ldap-0005-memleak-f", "cve_id": "CVE-2012-3955", "package": "dhcp", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "identical", "has_source_context": false, "license": "MPL-2.0", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "systemd-2025-journalctl-remove-leftover-mes", "cve_id": "CVE-2013-4288", "package": "systemd", "upstream_enriched": true, "upstream_commit": "db87a36e74ff26d1046a451ee086c9a2c4113d12", "upstream_repo": "systemd/systemd", "tier": "adapted", "has_source_context": true, "license": "LGPL-2.1-or-later", "context_tokens_est": 208, "context_files": 1 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "openssh-askpass-gnome-4527-openssh-6.6p1-audit6-server_ke", "cve_id": "CVE-2016-0777", "package": "openssh-askpass-gnome", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "adapted", "has_source_context": false, "license": "BSD-2-Clause", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "openssl-5042-0001-Fix-buffer-overrun-in-ASN", "cve_id": "CVE-2016-2105", "package": "openssl", "upstream_enriched": true, "upstream_commit": "697283ba418b21c4c0682d7050264b492e2ea4e2", "upstream_repo": "openssl/openssl", "tier": "adapted", "has_source_context": true, "license": "OpenSSL", "context_tokens_est": 1661, "context_files": 2 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "glibc-testsuite-5322-Avoid-deadlock-in-malloc-on-ba", "cve_id": "CVE-2016-3706", "package": "glibc-testsuite", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "adapted", "has_source_context": true, "license": "LGPL-2.1-or-later", "context_tokens_est": 2587, "context_files": 4 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "libgcrypt-5635-libgcrypt-fips_rsa_keygen.patc", "cve_id": "CVE-2016-6313", "package": "libgcrypt", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "adapted", "has_source_context": true, "license": "GPL-2.0-or-later AND LGPL-2.1-or-later AND GPL-3.0-or-later", "context_tokens_est": 1098, "context_files": 2 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "ImageMagick-5774-ImageMagick-CVE-2016-7514.patc", "cve_id": "CVE-2016-8684", "package": "ImageMagick", "upstream_enriched": true, "upstream_commit": "4b1fba0af7c54b9da3681b57087e370839e4ac7f", "upstream_repo": "ImageMagick/ImageMagick", "tier": "adapted", "has_source_context": false, "license": "ImageMagick", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "krb5-4168-0102-Fix-SPNEGO-context-aliasi", "cve_id": "CVE-2015-2695", "package": "krb5", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "adapted", "has_source_context": true, "license": "MIT", "context_tokens_est": 522, "context_files": 1 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "wireshark-3209-wireshark-1.2.0-geoip.patch", "cve_id": "CVE-2014-8710", "package": "wireshark", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "identical", "has_source_context": false, "license": "GPL-2.0-or-later AND GPL-3.0-or-later", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "krb5-4670-krb5-1.12-pam.patch", "cve_id": "CVE-2015-8629", "package": "krb5", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "adapted", "has_source_context": false, "license": "MIT", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "openssh-askpass-gnome-5597-openssh-6.6p1-audit6-server_ke", "cve_id": "CVE-2016-6210", "package": "openssh-askpass-gnome", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "adapted", "has_source_context": false, "license": "BSD-2-Clause", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "krb5-mini-4938-0100-Fix-build_principal-memor", "cve_id": "CVE-2016-3119", "package": "krb5-mini", "upstream_enriched": true, "upstream_commit": "f0c094a1b745d91ef2f9a4eae2149aac026a5789", "upstream_repo": "krb5/krb5", "tier": "adapted", "has_source_context": false, "license": "MIT", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "glibc-utils-4693-resolv-nameserver-handling.pat", "cve_id": "CVE-2015-8779", "package": "glibc-utils", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "adapted", "has_source_context": true, "license": "LGPL-2.1-or-later", "context_tokens_est": 2168, "context_files": 2 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "krb5-4938-0001-Fix-krb5_read_message-han", "cve_id": "CVE-2016-3119", "package": "krb5", "upstream_enriched": true, "upstream_commit": "102bb6ebf20f9174130c85c3b052ae104e5073ec", "upstream_repo": "krb5/krb5", "tier": "adapted", "has_source_context": false, "license": "MIT", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "coreutils-3827-coreutils-df-total-suppress-se", "cve_id": "CVE-2015-4042", "package": "coreutils", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "adapted", "has_source_context": false, "license": "GPL-3.0-or-later", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "openssl-5667-openssl-CVE-2016-2105.patch", "cve_id": "CVE-2016-6302", "package": "openssl", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "adapted", "has_source_context": true, "license": "OpenSSL", "context_tokens_est": 741, "context_files": 2 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "glibc-testsuite-5158-resolv-nameserver-handling.pat", "cve_id": "CVE-2016-3706", "package": "glibc-testsuite", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "adapted", "has_source_context": true, "license": "LGPL-2.1-or-later", "context_tokens_est": 2168, "context_files": 2 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "glibc-5158-resolv-nameserver-handling.pat", "cve_id": "CVE-2016-3706", "package": "glibc", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "adapted", "has_source_context": true, "license": "LGPL-2.1-or-later", "context_tokens_est": 2168, "context_files": 2 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "systemd-mini-2025-1011-libudev-avoid-leak-during", "cve_id": "CVE-2013-4288", "package": "systemd-mini", "upstream_enriched": true, "upstream_commit": "cf2292f5ac87087f57dbd632a25a332c9d194ebf", "upstream_repo": "systemd/systemd", "tier": "adapted", "has_source_context": true, "license": "LGPL-2.1-or-later", "context_tokens_est": 408, "context_files": 1 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "openssl-5650-openssl-CVE-2016-6306.patch", "cve_id": "CVE-2016-6302", "package": "openssl", "upstream_enriched": true, "upstream_commit": "ff553f837172ecb2b5c8eca257ec3c5619a4b299", "upstream_repo": "openssl/openssl", "tier": "adapted", "has_source_context": true, "license": "OpenSSL", "context_tokens_est": 558, "context_files": 1 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "openssl-5050-openssl-CVE-2015-3196.patch", "cve_id": "CVE-2016-2105", "package": "openssl", "upstream_enriched": true, "upstream_commit": "3c66a669dfc7b3792f7af0758ea26fe8502ce70c", "upstream_repo": "openssl/openssl", "tier": "adapted", "has_source_context": true, "license": "OpenSSL", "context_tokens_est": 1525, "context_files": 2 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "rsync-4076-rsync-equivalent_of_CVE-2014-8", "cve_id": "CVE-2014-8242", "package": "rsync", "upstream_enriched": true, "upstream_commit": "eac858085e3ac94ec0ab5061d11f52652c90a869", "upstream_repo": "RsyncProject/rsync", "tier": "adapted", "has_source_context": false, "license": "GPL-3.0-or-later", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "poppler-qt-5045-poppler-ligatures.patch", "cve_id": "CVE-2015-8868", "package": "poppler-qt", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "identical", "has_source_context": false, "license": "GPL-2.0-only OR GPL-3.0-only", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "glibc-testsuite-5322-resolv-nameserver-handling.pat", "cve_id": "CVE-2016-3706", "package": "glibc-testsuite", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "adapted", "has_source_context": true, "license": "LGPL-2.1-or-later", "context_tokens_est": 2168, "context_files": 2 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "dbus-1-1001-dbus-1.2.10-fd-limit-backport.", "cve_id": "CVE-2008-4311", "package": "dbus-1", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "identical", "has_source_context": false, "license": "AFL-2.1 OR GPL-2.0-or-later", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "file-2688-0001-off-by-one-in-out-of-boun", "cve_id": "CVE-2013-7345", "package": "file", "upstream_enriched": true, "upstream_commit": "70c65d2e1841491f59168db1f905e8b14083fb1c", "upstream_repo": "file/file", "tier": "adapted", "has_source_context": false, "license": "BSD-2-Clause", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "openssl-4352-0001-Axe-builtin-printf-implem", "cve_id": "CVE-2015-3194", "package": "openssl", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "adapted", "has_source_context": true, "license": "OpenSSL", "context_tokens_est": 4006, "context_files": 1 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "postgresql94-4741-postgresql-var-run-socket.patc", "cve_id": "CVE-2007-4772", "package": "postgresql94", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "identical", "has_source_context": true, "license": "PostgreSQL", "context_tokens_est": 2712, "context_files": 4 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "glibc-testsuite-4693-setlocale-directory-traversal.", "cve_id": "CVE-2015-8779", "package": "glibc-testsuite", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "adapted", "has_source_context": true, "license": "LGPL-2.1-or-later", "context_tokens_est": 3232, "context_files": 4 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "openssl-5050-openssl-1.0.1i-fipslocking.pat", "cve_id": "CVE-2016-2105", "package": "openssl", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "adapted", "has_source_context": true, "license": "OpenSSL", "context_tokens_est": 1698, "context_files": 3 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "glibc-5640-nss-dns-memleak.patch", "cve_id": "CVE-2016-6323", "package": "glibc", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "adapted", "has_source_context": true, "license": "LGPL-2.1-or-later", "context_tokens_est": 3275, "context_files": 7 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "krb5-5535-0100-Fix-build_principal-memor", "cve_id": "CVE-2016-3120", "package": "krb5", "upstream_enriched": true, "upstream_commit": "f0c094a1b745d91ef2f9a4eae2149aac026a5789", "upstream_repo": "krb5/krb5", "tier": "adapted", "has_source_context": false, "license": "MIT", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "krb5-4431-krb5-1.12.2-CVE-2014-5354.patc", "cve_id": "CVE-2015-2698", "package": "krb5", "upstream_enriched": true, "upstream_commit": "04038bf3633c4b909b5ded3072dc88c8c419bf16", "upstream_repo": "krb5/krb5", "tier": "adapted", "has_source_context": false, "license": "MIT", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "wireshark-5208-wireshark-1.2.0-geoip.patch", "cve_id": "CVE-2016-5358", "package": "wireshark", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "identical", "has_source_context": false, "license": "GPL-2.0-or-later AND GPL-3.0-or-later", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "openssl-5050-openssl-RSA_premaster_secret_i", "cve_id": "CVE-2016-2105", "package": "openssl", "upstream_enriched": true, "upstream_commit": "adb46dbc6dd7347750df2468c93e8c34bcb93a4b", "upstream_repo": "openssl/openssl", "tier": "adapted", "has_source_context": true, "license": "OpenSSL", "context_tokens_est": 423, "context_files": 1 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "mozilla-nss-5531-nss-uninitialized.patch", "cve_id": "CVE-2016-6354", "package": "mozilla-nss", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "identical", "has_source_context": false, "license": "MPL-2.0", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "systemd-2025-fix-logind-pty-seat.patch", "cve_id": "CVE-2013-4288", "package": "systemd", "upstream_enriched": true, "upstream_commit": "978cf3c75fbd94fd0e046206ada6169b35edd919", "upstream_repo": "systemd/systemd", "tier": "adapted", "has_source_context": true, "license": "LGPL-2.1-or-later", "context_tokens_est": 712, "context_files": 1 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "krb5-4431-krb5-1.12-CVE-2014-4343-Fix-do", "cve_id": "CVE-2015-2698", "package": "krb5", "upstream_enriched": true, "upstream_commit": "f18ddf5d82de0ab7591a36e465bc24225776940f", "upstream_repo": "krb5/krb5", "tier": "adapted", "has_source_context": false, "license": "MIT", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "openssl-4352-0002-dhparam-set-the-default-t", "cve_id": "CVE-2015-3194", "package": "openssl", "upstream_enriched": true, "upstream_commit": "8568170d774f02880eec6cad5512f555d0c83f65", "upstream_repo": "openssl/openssl", "tier": "adapted", "has_source_context": true, "license": "OpenSSL", "context_tokens_est": 1941, "context_files": 2 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "glibc-utils-5322-malloc-Fix-attached-thread-ref", "cve_id": "CVE-2016-3706", "package": "glibc-utils", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "adapted", "has_source_context": true, "license": "LGPL-2.1-or-later", "context_tokens_est": 1890, "context_files": 2 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "openssh-askpass-gnome-5597-openssh-6.6p1-seccomp_stat.pat", "cve_id": "CVE-2016-6210", "package": "openssh-askpass-gnome", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "identical", "has_source_context": false, "license": "BSD-2-Clause", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "curl-5786-curl-CVE-2014-3613.patch", "cve_id": "CVE-2016-8618", "package": "curl", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "adapted", "has_source_context": false, "license": "MIT", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "systemd-mini-2025-localectl-support-systems-with", "cve_id": "CVE-2013-4288", "package": "systemd-mini", "upstream_enriched": true, "upstream_commit": "17d33cecaa762f7e43200307328af5e9135e2091", "upstream_repo": "systemd/systemd", "tier": "adapted", "has_source_context": true, "license": "LGPL-2.1-or-later", "context_tokens_est": 1014, "context_files": 1 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "krb5-mini-4619-krb5-1.13-work-around-replay-c", "cve_id": "CVE-2015-8629", "package": "krb5-mini", "upstream_enriched": true, "upstream_commit": "c61e8c0c6ad5fda8d23dd896c4aed0ac5b470020", "upstream_repo": "krb5/krb5", "tier": "adapted", "has_source_context": false, "license": "MIT", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "ghostscript-library-883-ghostscript-9.00-echogs.patch", "cve_id": "CVE-2012-4405", "package": "ghostscript-library", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "identical", "has_source_context": false, "license": "AGPL-3.0-only", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "libssh-1119-0008-CVE-2012-4559-Ensure-that", "cve_id": "CVE-2012-4561", "package": "libssh", "upstream_enriched": true, "upstream_commit": "6236001ff4f9017c9f842d6548baba9760c95f5c", "upstream_repo": "libssh/libssh-mirror", "tier": "adapted", "has_source_context": false, "license": "LGPL-2.1-or-later", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "libgcrypt-4975-libgcrypt-fips_KAT_keygen_test", "cve_id": "CVE-2015-7511", "package": "libgcrypt", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "adapted", "has_source_context": true, "license": "GPL-2.0-or-later AND LGPL-2.1-or-later AND GPL-3.0-or-later", "context_tokens_est": 376, "context_files": 1 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "systemd-mini-2025-logind-capability-making-seats", "cve_id": "CVE-2013-4288", "package": "systemd-mini", "upstream_enriched": true, "upstream_commit": "955f9bde9ba6d9f0a7364d5cb7c0cee951d5caab", "upstream_repo": "systemd/systemd", "tier": "adapted", "has_source_context": true, "license": "LGPL-2.1-or-later", "context_tokens_est": 1799, "context_files": 2 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "coreutils-1251-coreutils-getaddrinfo.patch", "cve_id": "CVE-2013-0221", "package": "coreutils", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "identical", "has_source_context": false, "license": "GPL-3.0-or-later", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "ghostscript-5881-CVE-2013-5653.patch", "cve_id": "CVE-2013-5653", "package": "ghostscript", "upstream_enriched": true, "upstream_commit": "ab109aaeb3ddba59518b036fb288402a65cf7ce8", "upstream_repo": "ArtifexSoftware/ghostpdl", "tier": "adapted", "has_source_context": false, "license": "AGPL-3.0-only", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "libgcrypt-4975-libgcrypt-fips_run_selftest_at", "cve_id": "CVE-2015-7511", "package": "libgcrypt", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "identical", "has_source_context": true, "license": "GPL-2.0-or-later AND LGPL-2.1-or-later AND GPL-3.0-or-later", "context_tokens_est": 1786, "context_files": 2 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "openssl-5050-0001-Taking-only-the-struct-ch", "cve_id": "CVE-2016-2105", "package": "openssl", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "adapted", "has_source_context": false, "license": "OpenSSL", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "lighttpd-255-lighttpd-1.4.30_head_fixes.pat", "cve_id": "CVE-2011-4362", "package": "lighttpd", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "identical", "has_source_context": true, "license": "BSD-3-Clause", "context_tokens_est": 728, "context_files": 2 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "ghostscript-mini-5881-CVE-2013-5653.patch", "cve_id": "CVE-2013-5653", "package": "ghostscript-mini", "upstream_enriched": true, "upstream_commit": "ab109aaeb3ddba59518b036fb288402a65cf7ce8", "upstream_repo": "ArtifexSoftware/ghostpdl", "tier": "adapted", "has_source_context": false, "license": "AGPL-3.0-only", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "systemd-2026-fix-kill-session-crash.patch", "cve_id": "CVE-2013-4288", "package": "systemd", "upstream_enriched": true, "upstream_commit": "cc1368e3b3585ab822d76e00945ed4c064047530", "upstream_repo": "systemd/systemd", "tier": "adapted", "has_source_context": false, "license": "LGPL-2.1-or-later", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "openssl-5667-openssl-CVE-2016-6302.patch", "cve_id": "CVE-2016-6302", "package": "openssl", "upstream_enriched": true, "upstream_commit": "baaabfd8fdcec04a691695fad9a664bea43202b6", "upstream_repo": "openssl/openssl", "tier": "adapted", "has_source_context": true, "license": "OpenSSL", "context_tokens_est": 735, "context_files": 1 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "libxml2-1859-libxml2-CVE-2012-5134.patch", "cve_id": "CVE-2013-2877", "package": "libxml2", "upstream_enriched": true, "upstream_commit": "6a36fbe3b3e001a8a840b5c1fdd81cefc9947f0d", "upstream_repo": "GNOME/libxml2", "tier": "adapted", "has_source_context": true, "license": "MIT", "context_tokens_est": 659, "context_files": 1 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "krb5-4938-0103-Fix-IAKERB-context-export", "cve_id": "CVE-2016-3119", "package": "krb5", "upstream_enriched": true, "upstream_commit": "3db8dfec1ef50ddd78d6ba9503185995876a39fd", "upstream_repo": "krb5/krb5", "tier": "adapted", "has_source_context": false, "license": "MIT", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "krb5-4670-0105-Fix-leaks-in-kadmin-serve", "cve_id": "CVE-2015-8629", "package": "krb5", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "adapted", "has_source_context": false, "license": "MIT", "context_tokens_est": null, "context_files": null }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "freetype2-1225-CVE-2012-1143.patch", "cve_id": "CVE-2012-5669", "package": "freetype2", "upstream_enriched": true, "upstream_commit": "ba67957d5ead443f4b6b31805d6e780d54361ca4", "upstream_repo": "freetype/freetype", "tier": "adapted", "has_source_context": true, "license": "FTL AND GPL-2.0-only", "context_tokens_est": 1445, "context_files": 1 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "glibc-testsuite-5158-reinitialize-dl_load_write_loc", "cve_id": "CVE-2016-3706", "package": "glibc-testsuite", "upstream_enriched": null, "upstream_commit": null, "upstream_repo": null, "tier": "identical", "has_source_context": true, "license": "LGPL-2.1-or-later", "context_tokens_est": 673, "context_files": 1 }
[ { "role": "system", "content": "You are a security patch backporting assistant for SUSE/openSUSE.\n\nGiven a CVE description and an upstream fix, adapt the patch to work with\nthe target SUSE package version. Output the backported patch in unified\ndiff format. If the upstream fix applies directly, output i...
{ "id": "systemd-mini-2025-fix-dbus-crash.patch", "cve_id": "CVE-2013-4288", "package": "systemd-mini", "upstream_enriched": true, "upstream_commit": "645a9e5a2bbb06464a3fba1a3501e9d79e5bbad8", "upstream_repo": "systemd/systemd", "tier": "adapted", "has_source_context": true, "license": "LGPL-2.1-or-later", "context_tokens_est": 161, "context_files": 1 }