CVE-2015-7885
Description
The dgnc_mgmt_ioctl function in drivers/staging/dgnc/dgnc_mgmt.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2015-7885 is a low-severity information leak in the Linux kernel's Digi Neo/ClassicBoard driver due to uninitialized structure member in ioctl.
Vulnerability
The dgnc_mgmt_ioctl function in drivers/staging/dgnc/dgnc_mgmt.c in the Linux kernel through 4.3.3 does not initialize a certain structure member before copying it to user space. This affects the staging driver for Digi Neo and ClassicBoard devices, which is not enabled by default and requires the dgnc kernel module to be loaded. The vulnerability is present in all kernels up to and including version 4.3.3 [1][2][3].
Exploitation
A local attacker with the ability to call ioctl() on a device node exposed by the dgnc driver can trigger the information leak. No special privileges beyond local user access are required, but the dgnc module must be loaded. The attacker sends a crafted ioctl command to the device, causing the kernel to return uninitialized kernel stack memory to the attacker [4].
Impact
Successful exploitation allows a local attacker to obtain sensitive information from kernel memory. The leaked data may contain kernel addresses or other privileged data that could assist in further exploitation, though the severity is rated low due to the limited privilege required and the driver being part of the staging tree [1][2][3][4].
Mitigation
Ubuntu released kernel updates in USN-2841-1, USN-2841-2, and USN-2844-1 on 17 December 2015 that address this vulnerability [1][2][3]. Red Hat tracked this as CVE-2015-7885 but marked it NOTABUG, indicating the driver is not shipped with Red Hat Enterprise Linux [4]. Users of affected Ubuntu kernels should apply the recommended updates. For systems where the dgnc driver is not required, unloading the module or blacklisting it serves as a workaround.
- USN-2841-1: Linux kernel vulnerabilities | Ubuntu security notices | Ubuntu
- USN-2841-2: Linux kernel (Trusty HWE) vulnerabilities | Ubuntu security notices | Ubuntu
- USN-2844-1: Linux kernel (Utopic HWE) vulnerabilities | Ubuntu security notices | Ubuntu
- 1274728 – (CVE-2015-7885) CVE-2015-7885 kernel: staging/dgnc: information leak in ioctl
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
3- Range: <=4.3.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
14- git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/nvd
- www.openwall.com/lists/oss-security/2015/10/21/8nvd
- www.securityfocus.com/bid/77317nvd
- www.securitytracker.com/id/1034896nvd
- www.ubuntu.com/usn/USN-2841-1nvd
- www.ubuntu.com/usn/USN-2841-2nvd
- www.ubuntu.com/usn/USN-2842-1nvd
- www.ubuntu.com/usn/USN-2842-2nvd
- www.ubuntu.com/usn/USN-2843-1nvd
- www.ubuntu.com/usn/USN-2843-2nvd
- www.ubuntu.com/usn/USN-2843-3nvd
- www.ubuntu.com/usn/USN-2844-1nvd
- bugzilla.redhat.com/show_bug.cginvd
- github.com/torvalds/linux/commit/4b6184336ebb5c8dc1eae7f7ab46ee608a748b05nvd
News mentions
0No linked articles in our index yet.