- In computer security, a vulnerability is a weakness which can be exploited by a threat actor, such as an attacker, to perform unauthorized actions within a computer system.
- To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness.
- In this frame, vulnerability is also known as the attack surface.
My ‘Linux Security Issues’ page is growing so fast that I can barely keep up. Coming so fast that it can become difficult on deciding how to present such a steady supply of new information!?!
I found some of these pics so surprising that I decided to do a quick portrait of the Linux Kernel’s vulnerabilities…using just 2 pics:
Remember, this was just a *Brief Focus* on some of the vulnerabilities that I will be providing more links, pics, and info on, in ‘This Part of the Series’ … ?!? … i.e. am still deciding on how to present this new info…