Browse all 4 CVE security advisories affecting needrestart. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Needrestart identifies system services requiring restart after security updates to prevent vulnerable running processes, addressing critical post-patch gaps. Historically, it has mitigated vulnerabilities across multiple classes, including remote code execution, privilege escalation, and memory corruption flaws. With four CVEs on record, these typically stem from unpatched services persisting in memory after updates. The tool's core strength lies in its ability to detect and restart services without full system reboots, reducing downtime while maintaining security posture. While no major public incidents are documented, its CVE history reflects the ongoing challenge of maintaining secure service states during patch management cycles.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-48992 | needrestart 安全漏洞 — needrestart | 7.8 | High | 2024-11-19 |
| CVE-2024-48991 | needrestart 安全漏洞 — needrestart | 7.8 | High | 2024-11-19 |
| CVE-2024-48990 | needrestart 安全漏洞 — needrestart | 7.8 | High | 2024-11-19 |
| CVE-2024-11003 | needrestart 安全漏洞 — needrestart | 7.8 | High | 2024-11-19 |
This page lists every published CVE security advisory associated with needrestart. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.