CVE-2026-31528 PUBLISHED

perf: Make sure to use pmu_ctx->pmu for groups

Assigner: Linux
Reserved: 09.03.2026 Published: 22.04.2026 Updated: 22.04.2026

In the Linux kernel, the following vulnerability has been resolved:

perf: Make sure to use pmu_ctx->pmu for groups

Oliver reported that x86_pmu_del() ended up doing an out-of-bound memory access when group_sched_in() fails and needs to roll back.

This should be handled by the transaction callbacks, but he found that when the group leader is a software event, the transaction handlers of the wrong PMU are used. Despite the move_group case in perf_event_open() and group_sched_in() using pmu_ctx->pmu.

Turns out, inherit uses event->pmu to clone the events, effectively undoing the move_group case for all inherited contexts. Fix this by also making inherit use pmu_ctx->pmu, ensuring all inherited counters end up in the same pmu context.

Similarly, __perf_event_read() should use equally use pmu_ctx->pmu for the group case.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from bd27568117664b8b3e259721393df420ed51f57b to 656f35b463995bee024d948440128230aacd81e1 (excl.)
  • affected from bd27568117664b8b3e259721393df420ed51f57b to 3a696e84a8b1fafdd774bb30d62919faf844d9e4 (excl.)
  • affected from bd27568117664b8b3e259721393df420ed51f57b to 35f7914e54fe7f13654c22ee045b05e4b6d8062b (excl.)
  • affected from bd27568117664b8b3e259721393df420ed51f57b to 4c759446046500a1a6785b25725725c3ff087ace (excl.)
  • affected from bd27568117664b8b3e259721393df420ed51f57b to 4b9ce671960627b2505b3f64742544ae9801df97 (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 6.2 is affected
  • unaffected from 0 to 6.2 (excl.)
  • unaffected from 6.6.131 to 6.6.* (incl.)
  • unaffected from 6.12.80 to 6.12.* (incl.)
  • unaffected from 6.18.21 to 6.18.* (incl.)
  • unaffected from 6.19.11 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References