The talk presents a study on the dependence of critical proprietary and open source software on Chinese vulnerability disclosures and the impact of recent Chinese laws on vulnerability research. The talk also provides recommendations on how to address the 'supply shock' of vulnerabilities from the Chinese research community.
- The talk presents a quantitative analysis on the changing proportion of Chinese based vulnerability disclosures to major software products from a selection of proprietary vendors as well as several major open source packages.
- The analysis considers changes over time in response to the evolving Chinese legal environment, significant divergence from data on the allocations of bug bounty rewards, and noteworthy trends in the type and severity of acknowledged vulnerabilities.
- Recent laws designed to give the Chinese government early access to the community's discoveries and the government's willingness to enforce those laws demand a more thorough accounting.
- The talk addresses implications for infosec as well as the wider policy environment, including selected recommendations on how to address the 'supply shock' of vulnerabilities from the Chinese research community.
The talk uses the example of the log4j vulnerability to illustrate the importance of vulnerability research and the potential impact of bad policy on the ecosystem. A researcher at Alibaba Cloud discovered the vulnerability and reported it directly and privately to Apache, which promptly began patching. However, the researcher later noticed that the vulnerability was being exploited and reported it publicly. This incident highlights the importance of vulnerability research and the need for effective policies to support it.