Browse all 5 CVE security advisories affecting kernel. AI-powered Chinese analysis, POCs, and references for each vulnerability.
The kernel serves as the core component managing hardware resources and software interactions in operating systems. Historically, it has been susceptible to remote code execution, privilege escalation, and memory corruption vulnerabilities due to its extensive attack surface and complex codebase. With five current CVEs, ongoing risks include flaws in memory management and process handling that could allow attackers to bypass security controls. Notable incidents include vulnerabilities like Dirty Pipe and Dirty Cow, which enabled privilege escalation in Linux systems. The kernel's position as a privileged layer makes it a high-value target, requiring rigorous patch management and security hardening to mitigate potential compromises.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2018-10840 | Linux kernel 缓冲区错误漏洞 — heap-based buffer overflow in fs/ext4/xattr.cCWE-122 | 7.8 | - | 2018-07-16 |
| CVE-2016-9604 | Linux kernel 安全漏洞 — securityCWE-732 | 4.4 | - | 2018-07-11 |
| CVE-2018-1108 | Linux kernel驱动程安全特征问题漏洞 — driversCWE-330 | 6.5 | - | 2018-05-21 |
| CVE-2018-1087 | Linux kernel KVM 权限许可和访问控制问题漏洞 — KVMCWE-250 | 7.1 | - | 2018-05-15 |
| CVE-2018-1118 | Linux kernel 信息泄露漏洞 — vhostCWE-665 | 5.5 | - | 2018-05-10 |
This page lists every published CVE security advisory associated with kernel. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.