Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: perf/x86: Fix potential bad container_of in intel_pmu_hw_config Auto counter reload may have a group of events with software events present within it. The software event PMU isn't the x86_hybrid_pmu and a container_of operation in intel_pmu_set_acr_caused_constr (via the hybrid helper) could cause out of bound memory reads. Avoid this by guarding the call to intel_pmu_set_acr_caused_constr with an is_x86_event check.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.16.1, < 6.18.22 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/bfee04838f636d064bc92075c65c95f739003804Patch
- https://git.kernel.org/stable/c/dbde07f06226438cd2cf1179745fa1bec5d8914aPatch
- https://git.kernel.org/stable/c/e435a30ca6fe14c9611b1fc731c98a6d28410247Patch
FAQ
What is CVE-2026-31782?
CVE-2026-31782 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux kernel, the following vulnerability has been resolved: perf/x86: Fix potential bad container_of in intel_pmu_hw_config Auto counter reload may have a group of events with software event...
How severe is CVE-2026-31782?
CVE-2026-31782 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-31782?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.