A fault in a widely used component of most Linux distributions could allow an attacker to take remote control of a system after merely sending a malicious email.
The vulnerability, nicknamed "Ghost," is in the GNU C Library known as glibc, according to security vendor Qualys, which disclosed the issue on Tuesday as many Linux distributions released patches. Glibc is a C library that defines system calls.
There is no shortage of security-focused Linux distributions on the market, and among them is Pentoo Linux. While some security-focused Linux distributions concentrate on privacy, like Tails, others like Kali Linux and Pentoo focus on security research, providing tools that enable research and penetration testing. Pentoo Linux differentiates itself from other security Linux distributions in a number of ways.
2014 brought us plenty of new open-spec, community-backed SBCs — from $35 bargains, to octa-core powerhouses — and all with Linux or Android support.
The Linux Mint team recently released Linux Mint 17.1—a somewhat minor but still welcome upgrade to the Ubuntu-based ecosystem. And while Linux Mint 17.1 arrives as it usually does (a few weeks after the release of a new version of Ubuntu), version 17.1 is not based on Ubuntu's latest effort, 14.10. Instead, this edition of Mint remains tied to the last Long Term Support (LTS) release, Ubuntu 14.04.
The Linux OS is likely to become even more popular as 32bit computing becomes a commodity and projects like Yocto make it easier to create, develop and maintain Linux based systems for embedded applications.
One of the advantages of Linux is that it enables OEMs to become more like startups, where agile hardware development teams speed time to market by using an OS to abstract the underlying hardware details. However, despite its benefits, a Linux system can be vulnerable to rootkits unless its embedded processor is booted properly.