Linux-servers rooted and plundered via 0-day
Cloud Linux seems most threated now… Maybe a little Dramatic ? 
I asked for opinions on your assessment of the status of Linux security Polonus, from interpretting the info in the links you posted, and got some interesting feedback.
The last thing we want is to discourage people using Linux, so I really have to put forward a reponse, from the experts.
Sure what you posted is true, But,… Linux-servers rooted and plundered via 0-day, maybe over stepping, and misleading to the general state of Linux now.
From the developer of a popular Linux Distro in response to asking for an opinion on this post:
A local exploit for the everyday home Linux user requires someone to be in front of your computer to execute. If someone is sitting in front of your computer they can simply boot into single user mode. The exploit isn't even required to get elevated privileges.
[b]
A remote exploit is a serious matter. A remote exploit would allow someone to get access to your computer without being in front of it and able to get root access. These types of exploits are far and few.[/b]
[b]Response from Advanced Linux user, who read your post:[/b]
About the php thingie... Php is php. Linux is Linux.[b] If php is vulnerable then it's vulnerable on all operating systems it's being installed to [/b]- [u]just like Java, Flash, Adobe Reader or Firefox for example.[/u] [b]This is called cross-platform vulnerability and NOT Linux vulnerability.[/b]
Unless someone (developer of the application) did a boo boo while creating Linux-specific package - this way only “Linux” is vulnerable altho here we need to stop and think about what Linux really is… Linux is a kernel.
Kernel that the apps use to share resources. Linux != apps. App vulnerability != Linux vulnerability.
Advice on Linux Security, along the line of thought mag put forward. :
Bios password, booting from the first / local hdd, full drive encryption... those can slow down (or even stop) the machine from being locally exploited ;).
If the person gains access to Your machine and cannot go past the cmos password or boot from other media then first local HDD - they have to reset the bios password. This takes time and tools (especially on laptops). After that even if they go past the bios password they are being asked for the hdd encryption password and cannot boot to the OS without it (neither will they boot to the single user mode). Even if they can now boot into the LiveCD - they won’t be able to see the HDD content without the passcode… This can be cracked given time. Sometimes a lot of time is needed. Sometimes attacker gives in after hours and hours and hours of cracking…
There are as You said - few of them - the most recent I hear about is the ssh imitating backdoor which has hit the RHEL based distros (some cases on Debian as well)…
Regards.
So, as the Topic heading sounds very dramatic, in reality such exploits are rare, and Linux is alive and well, ready to respond quickly to any vulnerability.
Also, Btw… We don’t have to wait for a fix till the second Tuesday of the month.
I’ve not given names of the responders, as I find it irrelevant, but will if asked.
Also, this is not an attack on you Polonus, I respect you for about a decade now, just some clarification of this thread for others thinking of using Linux.
Another point I’d personally like to make. Linux is a Academic pursuit, Microsoft windows is a Huge Business.
Regards all,
Abraxas.