In the Linux kernel, the following vulnerability has been resolved: usb: idmouse: fix an uninit-value in idmouseopen In idmousecreateimage, if any ftipcommand fails, it will go to the reset label. However, this leads to the data in bulkinbuffer[HEADER..IMGSIZE] uninitialized. And the check for valid image incurs an uninitialized dereference. Fix this by moving the check before reset label since this check only be valid if the data after bulkinbuffer[HEADER] has concrete data. Note that this is found by KMSAN, so only kernel compilation is tested.