安全公告详情

NS-SA-2026-0037

2026-03-27 21:27:27

简介

important: webkitgtk/wpa_supplicant security update

严重级别

important

主题

An update for webkitgtk/wpa_supplicant is now available for NewStart CGSL MAIN 7.02.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

webkitgtk:
wpa_supplicant:


Security Fix(es):
webkitgtk: A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds write due to improper checks to prevent unauthorized actions, causing a break out of Web Content sandbox.(CVE-2025-24201)
webkitgtk: bugfix
wpa_supplicant: A flaw was found in the IEEE 802.11 standard. This vulnerability possibly allows an adversary to trick a victim into connecting to an unintended or untrusted network because the SSID is not always used to derive the pairwise master key or session keys and because there is not a protected exchange of an SSID during a 4-way handshake.(CVE-2023-52424)
wpa_supplicant: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 7.02.06B7.

影响组件

  • webkitgtk
  • wpa_supplicant

影响产品

  • CGSL MAIN 7.02

更新包

{"fix":[{"product":"CGSL MAIN 7.02","pkgs":[{"binary":["webkitgtk6.0-devel-2.48.5-1.zncgsl7.4.x86_64.rpm","webkit2gtk4.1-doc-2.48.5-1.zncgsl7.4.noarch.rpm","webkitgtk6.0-doc-2.48.5-1.zncgsl7.4.noarch.rpm","webkit2gtk4.1-devel-2.48.5-1.zncgsl7.4.x86_64.rpm","webkitgtk6.0-2.48.5-1.zncgsl7.4.x86_64.rpm","webkit2gtk4.1-2.48.5-1.zncgsl7.4.x86_64.rpm","javascriptcoregtk4.1-devel-2.48.5-1.zncgsl7.4.x86_64.rpm","javascriptcoregtk6.0-devel-2.48.5-1.zncgsl7.4.x86_64.rpm","javascriptcoregtk4.1-2.48.5-1.zncgsl7.4.x86_64.rpm","javascriptcoregtk6.0-2.48.5-1.zncgsl7.4.x86_64.rpm"],"source":"webkitgtk-2.48.5-1.zncgsl7.4.src.rpm"},{"binary":["wpa_supplicant-doc-2.11-1.zncgsl7.1.noarch.rpm","wpa_supplicant-2.11-1.zncgsl7.1.x86_64.rpm"],"source":"wpa_supplicant-2.11-1.zncgsl7.1.src.rpm"}]}]}

CVE

参考