| Summary | In the Linux kernel, the following vulnerability has been resolved: perf: Make sure to use pmu_ctx->pmu for groups Oliver reported that x86_pmu_del() ended up doing an out-of-bound memory access This *should* be handled by the transaction callbacks, but he found that when Turns out, inherit uses event->pmu to clone the events, effectively undoing the Similarly, __perf_event_read() should use equally use pmu_ctx->pmu for the |
|---|---|
| Publication Date | April 22, 2026, 11:16 p.m. |
| Registration Date | April 25, 2026, 4:05 a.m. |
| Last Update | April 24, 2026, 1:17 a.m. |