Hi Eric,
I took a little pause from my self-appointed "Vexator-in-chief" position
after FOSDEM, but I am returning to the subject these days.
We have a fully working prototype automation:
https://github.com/vex-generation-toolset
which can be integrated into Solr via some additional workflows in
solr-site:
https://github.com/apache/solr-site/pull/163
The automation still has a lot of rough edges to smooth out, but it can
already create PRs like these:
https://github.com/vex-generation-toolset/solr-site/pull/1
https://github.com/vex-generation-toolset/solr-site/pull/2
Those are admittedly far from being as detailed as a handcrafted one:
https://github.com/apache/solr-site/pull/152
Beyond the limitations of the toolchain, however, the main challenge for
keeping the VEX file up to date is maintainer time. Since there are many
topics more interesting than assessing the impact of low- and
moderate-severity vulnerabilities on Solr, the automation must surface
the right level of detail to let maintainers quickly review a PR. It
also needs a low false-positive rate, which can only be achieved by
testing against each CVE as it appears.
One could argue that we should send all the details to an LLM for
evaluation these days, but security is too serious a topic to risk
hallucinations.
If anyone is available to review the two PRs above from the perspective
of what data is useful and what is not, I would be happy to put more
work into the VEX Generation Toolset.
The callgraph-metadata database [1], which contains all the data needed
to determine the reachability of a vulnerability, is currently
configured to track CVEs in the dependencies of Solr 9.10.0. I will
update it to follow Solr 10.0.0 shortly.
One related note: my PR to generate an SBOM for Solr from within the
build was closed due to inactivity:
https://github.com/apache/solr/pull/3929
Piotr
[1] https://github.com/vex-generation-toolset/callgraph-metadata
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]