The article does not describe a vulnerability particular to Linux.
Quote:
...it is hard to tell how this Trojanized SSH daemon made its way on a compromised server...
|
Any system with an sshd server is "vulnerable" if the sshd server can be replaced by a stranger..