In the Linux kernel, the following vulnerability has been resolved:
net/usb: kalmia: Don't pass actlen in usbbulk_msg error path
syzbot reported that actlen in kalmiasendinitpacket() is uninitialized when passing it to the first usbbulkmsg error path. Jiri Pirko noted that it's pointless to pass it in the error path, and that the value that would be printed in the second error path would be the value of actlen from the first call to usbbulk_msg.[1]
With this in mind, let's just not pass actlen to the usbbulk_msg error paths.
1: https://lore.kernel.org/lkml/Y9pY61y1nwTuzMOa@nanopsycho/