CVE-2024-58064

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-58064
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-58064.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-58064
Downstream
Related
Published
2025-03-06T15:54:05Z
Modified
2025-10-17T20:17:36.408686Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
wifi: cfg80211: tests: Fix potential NULL dereference in test_cfg80211_parse_colocated_ap()
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: tests: Fix potential NULL dereference in testcfg80211parsecolocatedap()

kunit_kzalloc() may return NULL, dereferencing it without NULL check may lead to NULL dereference. Add a NULL check for ies.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
45d43937a44c806b8649323b8f5d9f42ae838b0e
Fixed
886271409603956edd09df229dde7442c410a872
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
45d43937a44c806b8649323b8f5d9f42ae838b0e
Fixed
0d17d81143f5aa56ee87e60bb1000a2372a0ada8
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
45d43937a44c806b8649323b8f5d9f42ae838b0e
Fixed
13c4f7714c6a1ecf748a2f22099447c14fe6ed8c

Affected versions

v6.*

v6.10
v6.10-rc1
v6.10-rc2
v6.10-rc3
v6.10-rc4
v6.10-rc5
v6.10-rc6
v6.10-rc7
v6.11
v6.11-rc1
v6.11-rc2
v6.11-rc3
v6.11-rc4
v6.11-rc5
v6.11-rc6
v6.11-rc7
v6.12
v6.12-rc1
v6.12-rc2
v6.12-rc3
v6.12-rc4
v6.12-rc5
v6.12-rc6
v6.12-rc7
v6.12.1
v6.12.10
v6.12.11
v6.12.12
v6.12.2
v6.12.3
v6.12.4
v6.12.5
v6.12.6
v6.12.7
v6.12.8
v6.12.9
v6.13
v6.13-rc1
v6.13-rc2
v6.13-rc3
v6.13-rc4
v6.13-rc5
v6.13-rc6
v6.13-rc7
v6.13.1
v6.8
v6.8-rc2
v6.8-rc3
v6.8-rc4
v6.8-rc5
v6.8-rc6
v6.8-rc7
v6.9
v6.9-rc1
v6.9-rc2
v6.9-rc3
v6.9-rc4
v6.9-rc5
v6.9-rc6
v6.9-rc7

Database specific

vanir_signatures

[
    {
        "id": "CVE-2024-58064-0267b188",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Function",
        "target": {
            "file": "net/wireless/tests/scan.c",
            "function": "test_cfg80211_parse_colocated_ap"
        },
        "digest": {
            "function_hash": "330744598743724810108364283883713365070",
            "length": 1681.0
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@13c4f7714c6a1ecf748a2f22099447c14fe6ed8c"
    },
    {
        "id": "CVE-2024-58064-7f8f3cf9",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Line",
        "target": {
            "file": "net/wireless/tests/scan.c"
        },
        "digest": {
            "line_hashes": [
                "288070580503645636825216663576967291308",
                "333674393434688248788092163801527707327",
                "96824921895344723753746940179369448271",
                "218321610434991786167108035212669872028"
            ],
            "threshold": 0.9
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0d17d81143f5aa56ee87e60bb1000a2372a0ada8"
    },
    {
        "id": "CVE-2024-58064-ba5e288d",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Line",
        "target": {
            "file": "net/wireless/tests/scan.c"
        },
        "digest": {
            "line_hashes": [
                "288070580503645636825216663576967291308",
                "333674393434688248788092163801527707327",
                "96824921895344723753746940179369448271",
                "218321610434991786167108035212669872028"
            ],
            "threshold": 0.9
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@13c4f7714c6a1ecf748a2f22099447c14fe6ed8c"
    },
    {
        "id": "CVE-2024-58064-c215207a",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Function",
        "target": {
            "file": "net/wireless/tests/scan.c",
            "function": "test_cfg80211_parse_colocated_ap"
        },
        "digest": {
            "function_hash": "330744598743724810108364283883713365070",
            "length": 1681.0
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@886271409603956edd09df229dde7442c410a872"
    },
    {
        "id": "CVE-2024-58064-c59f35e4",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Function",
        "target": {
            "file": "net/wireless/tests/scan.c",
            "function": "test_cfg80211_parse_colocated_ap"
        },
        "digest": {
            "function_hash": "330744598743724810108364283883713365070",
            "length": 1681.0
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0d17d81143f5aa56ee87e60bb1000a2372a0ada8"
    },
    {
        "id": "CVE-2024-58064-f40bcf87",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Line",
        "target": {
            "file": "net/wireless/tests/scan.c"
        },
        "digest": {
            "line_hashes": [
                "288070580503645636825216663576967291308",
                "333674393434688248788092163801527707327",
                "96824921895344723753746940179369448271",
                "218321610434991786167108035212669872028"
            ],
            "threshold": 0.9
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@886271409603956edd09df229dde7442c410a872"
    }
]

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.9.0
Fixed
6.12.13
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.13.2