In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211: reject TDLS operations when station is not associated
syzbot triggered a WARN in ieee80211tdlsoper() by sending NL80211TDLSENABLELINK immediately after NL80211CMD_CONNECT, before association completed and without prior TDLS setup.
This left internal state like sdata->u.mgd.tdlspeer uninitialized, leading to a WARNON() in code paths that assumed it was valid.
Reject the operation early if not in station mode or not associated.