Hacker News new | past | comments | ask | show | jobs | submit login

But as this article points out, liblzma is used in other crucial processes, and is generally trusted, often probably being run as root. The known bad actor contributed lots of code to xz that isn’t involved in the SSH backdoor. To assume it’s all innocuous would be truly foolish.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: