CVE-2026-31782
perf/x86: Fix potential bad container_of in intel_pmu_hw_config
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: perf/x86: Fix potential bad container_of in intel_pmu_hw_config Auto counter reload may have a group of events with software events present within it. The software event PMU isn't the x86_hybrid_pmu and a container_of operation in intel_pmu_set_acr_caused_constr (via the hybrid helper) could cause out of bound memory reads. Avoid this by guarding the call to intel_pmu_set_acr_caused_constr with an is_x86_event check.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | May 1, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
ec980e4facef8110f6fce27e5b6344660117f01f < e435a30ca6fe14c9611b1fc731c98a6d28410247 ec980e4facef8110f6fce27e5b6344660117f01f < bfee04838f636d064bc92075c65c95f739003804 ec980e4facef8110f6fce27e5b6344660117f01f < dbde07f06226438cd2cf1179745fa1bec5d8914a
Linux / Linux
6.16