{"id":"CVE-2016-0823","details":"The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel before 3.19.3, as used in Android 6.0.1 before 2016-03-01, allows local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721.","modified":"2026-03-15T22:03:00.303762Z","published":"2016-03-12T21:59:08.027Z","related":["SUSE-SU-2016:2976-1","SUSE-SU-2016:3069-1","SUSE-SU-2017:0333-1","SUSE-SU-2017:0494-1"],"references":[{"type":"WEB","url":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.19.3"},{"type":"WEB","url":"http://www.securityfocus.com/bid/84265"},{"type":"WEB","url":"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ab676b7d6fbf4b294bf198fb27ade5b0e865c7ce"},{"type":"ADVISORY","url":"http://source.android.com/security/bulletin/2016-03-01.html"},{"type":"FIX","url":"https://github.com/torvalds/linux/commit/ab676b7d6fbf4b294bf198fb27ade5b0e865c7ce"},{"type":"ARTICLE","url":"http://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"6.0.1"}]},{"events":[{"introduced":"0"},{"last_affected":"3.19.2"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-0823.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}]}