In the Linux kernel, the following vulnerability has been resolved:
wifi: cfg80211: tests: Fix potential NULL dereference in testcfg80211parsecolocatedap()
kunit_kzalloc() may return NULL, dereferencing it without NULL check may lead to NULL dereference. Add a NULL check for ies.
[
    {
        "id": "CVE-2024-58064-0267b188",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Function",
        "target": {
            "file": "net/wireless/tests/scan.c",
            "function": "test_cfg80211_parse_colocated_ap"
        },
        "digest": {
            "function_hash": "330744598743724810108364283883713365070",
            "length": 1681.0
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@13c4f7714c6a1ecf748a2f22099447c14fe6ed8c"
    },
    {
        "id": "CVE-2024-58064-7f8f3cf9",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Line",
        "target": {
            "file": "net/wireless/tests/scan.c"
        },
        "digest": {
            "line_hashes": [
                "288070580503645636825216663576967291308",
                "333674393434688248788092163801527707327",
                "96824921895344723753746940179369448271",
                "218321610434991786167108035212669872028"
            ],
            "threshold": 0.9
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0d17d81143f5aa56ee87e60bb1000a2372a0ada8"
    },
    {
        "id": "CVE-2024-58064-ba5e288d",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Line",
        "target": {
            "file": "net/wireless/tests/scan.c"
        },
        "digest": {
            "line_hashes": [
                "288070580503645636825216663576967291308",
                "333674393434688248788092163801527707327",
                "96824921895344723753746940179369448271",
                "218321610434991786167108035212669872028"
            ],
            "threshold": 0.9
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@13c4f7714c6a1ecf748a2f22099447c14fe6ed8c"
    },
    {
        "id": "CVE-2024-58064-c215207a",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Function",
        "target": {
            "file": "net/wireless/tests/scan.c",
            "function": "test_cfg80211_parse_colocated_ap"
        },
        "digest": {
            "function_hash": "330744598743724810108364283883713365070",
            "length": 1681.0
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@886271409603956edd09df229dde7442c410a872"
    },
    {
        "id": "CVE-2024-58064-c59f35e4",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Function",
        "target": {
            "file": "net/wireless/tests/scan.c",
            "function": "test_cfg80211_parse_colocated_ap"
        },
        "digest": {
            "function_hash": "330744598743724810108364283883713365070",
            "length": 1681.0
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0d17d81143f5aa56ee87e60bb1000a2372a0ada8"
    },
    {
        "id": "CVE-2024-58064-f40bcf87",
        "deprecated": false,
        "signature_version": "v1",
        "signature_type": "Line",
        "target": {
            "file": "net/wireless/tests/scan.c"
        },
        "digest": {
            "line_hashes": [
                "288070580503645636825216663576967291308",
                "333674393434688248788092163801527707327",
                "96824921895344723753746940179369448271",
                "218321610434991786167108035212669872028"
            ],
            "threshold": 0.9
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@886271409603956edd09df229dde7442c410a872"
    }
]