Thanks Piotr for updating me.   I am brainstorming for a client what having a 
long term support version of Solr might look like (more to come on that for the 
community), and as we were discussing "what would the work look like (back 
porting of CVE fixes etc) I suggested that having VEX files being created could 
be in the scope of the work.  This would make it part of someone 's day job to 
product VEX files as part of their LTS work, which might help get this 
initiative moving!   
I suspect that there is a bit of chicken and egg..  Until security teams will 
sign off on "no issue here" based on a VEX file, then impetus to produce them 
will be limited.  Do we know that VEX files are accepted by security teams in 
liue of actual changes?  I don't have a sense of if these files are becoming 
"commonly used by industry" or if it's still something you are inventing.
This may be an interesting topic to workshop together at C/C in Glasgow in the 
fall if you are there btw.
Eric
    On Wednesday, April 15, 2026 at 09:43:30 AM EDT, Piotr P. Karwasz 
<[email protected]> wrote:  
 
 Hi Eric,

I took a little pause from my self-appointed "Vexator-in-chief" position
after FOSDEM, but I am returning to the subject these days.

We have a fully working prototype automation:

    https://github.com/vex-generation-toolset

which can be integrated into Solr via some additional workflows in
solr-site:

    https://github.com/apache/solr-site/pull/163

The automation still has a lot of rough edges to smooth out, but it can
already create PRs like these:

    https://github.com/vex-generation-toolset/solr-site/pull/1
    https://github.com/vex-generation-toolset/solr-site/pull/2

Those are admittedly far from being as detailed as a handcrafted one:

    https://github.com/apache/solr-site/pull/152

Beyond the limitations of the toolchain, however, the main challenge for
keeping the VEX file up to date is maintainer time. Since there are many
topics more interesting than assessing the impact of low- and
moderate-severity vulnerabilities on Solr, the automation must surface
the right level of detail to let maintainers quickly review a PR. It
also needs a low false-positive rate, which can only be achieved by
testing against each CVE as it appears.

One could argue that we should send all the details to an LLM for
evaluation these days, but security is too serious a topic to risk
hallucinations.

If anyone is available to review the two PRs above from the perspective
of what data is useful and what is not, I would be happy to put more
work into the VEX Generation Toolset.

The callgraph-metadata database [1], which contains all the data needed
to determine the reachability of a vulnerability, is currently
configured to track CVEs in the dependencies of Solr 9.10.0. I will
update it to follow Solr 10.0.0 shortly.

One related note: my PR to generate an SBOM for Solr from within the
build was closed due to inactivity:

    https://github.com/apache/solr/pull/3929

Piotr

[1] https://github.com/vex-generation-toolset/callgraph-metadata

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

  

Reply via email to