CVE-2026-31782 PUBLISHED

perf/x86: Fix potential bad container_of in intel_pmu_hw_config

Assigner: Linux
Reserved: 09.03.2026 Published: 01.05.2026 Updated: 01.05.2026

In the Linux kernel, the following vulnerability has been resolved:

perf/x86: Fix potential bad container_of in intel_pmu_hw_config

Auto counter reload may have a group of events with software events present within it. The software event PMU isn't the x86_hybrid_pmu and a container_of operation in intel_pmu_set_acr_caused_constr (via the hybrid helper) could cause out of bound memory reads. Avoid this by guarding the call to intel_pmu_set_acr_caused_constr with an is_x86_event check.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from ec980e4facef8110f6fce27e5b6344660117f01f to e435a30ca6fe14c9611b1fc731c98a6d28410247 (excl.)
  • affected from ec980e4facef8110f6fce27e5b6344660117f01f to bfee04838f636d064bc92075c65c95f739003804 (excl.)
  • affected from ec980e4facef8110f6fce27e5b6344660117f01f to dbde07f06226438cd2cf1179745fa1bec5d8914a (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 6.16 is affected
  • unaffected from 0 to 6.16 (excl.)
  • unaffected from 6.18.22 to 6.18.* (incl.)
  • unaffected from 6.19.12 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References