VYPR
Low severity2.3NVD Advisory· Published Dec 28, 2015· Updated May 6, 2026

CVE-2015-7885

CVE-2015-7885

Description

The dgnc_mgmt_ioctl function in drivers/staging/dgnc/dgnc_mgmt.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2015-7885 is a low-severity information leak in the Linux kernel's Digi Neo/ClassicBoard driver due to uninitialized structure member in ioctl.

Vulnerability

The dgnc_mgmt_ioctl function in drivers/staging/dgnc/dgnc_mgmt.c in the Linux kernel through 4.3.3 does not initialize a certain structure member before copying it to user space. This affects the staging driver for Digi Neo and ClassicBoard devices, which is not enabled by default and requires the dgnc kernel module to be loaded. The vulnerability is present in all kernels up to and including version 4.3.3 [1][2][3].

Exploitation

A local attacker with the ability to call ioctl() on a device node exposed by the dgnc driver can trigger the information leak. No special privileges beyond local user access are required, but the dgnc module must be loaded. The attacker sends a crafted ioctl command to the device, causing the kernel to return uninitialized kernel stack memory to the attacker [4].

Impact

Successful exploitation allows a local attacker to obtain sensitive information from kernel memory. The leaked data may contain kernel addresses or other privileged data that could assist in further exploitation, though the severity is rated low due to the limited privilege required and the driver being part of the staging tree [1][2][3][4].

Mitigation

Ubuntu released kernel updates in USN-2841-1, USN-2841-2, and USN-2844-1 on 17 December 2015 that address this vulnerability [1][2][3]. Red Hat tracked this as CVE-2015-7885 but marked it NOTABUG, indicating the driver is not shipped with Red Hat Enterprise Linux [4]. Users of affected Ubuntu kernels should apply the recommended updates. For systems where the dgnc driver is not required, unloading the module or blacklisting it serves as a workaround.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

14

News mentions

0

No linked articles in our index yet.