| 概要 | In the Linux kernel, the following vulnerability has been resolved: perf: Make sure to use pmu_ctx->pmu for groups Oliver reported that x86_pmu_del() ended up doing an out-of-bound memory access This *should* be handled by the transaction callbacks, but he found that when Turns out, inherit uses event->pmu to clone the events, effectively undoing the Similarly, __perf_event_read() should use equally use pmu_ctx->pmu for the |
|---|---|
| 公表日 | 2026年4月22日23:16 |
| 登録日 | 2026年4月25日4:05 |
| 最終更新日 | 2026年4月24日1:17 |