CVE-2015-7885
Ubuntu Security Notice USN-2843-2
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The dgnc_mgmt_ioctl function in drivers/staging/dgnc/dgnc_mgmt.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.
La función dgnc_mgmt_ioctl en drivers/staging/dgnc/dgnc_mgmt.c en el kernel de Linux hasta la versión 4.3.3 no inicializa cierto miembro de estructura, lo que permite a usuarios locales obtener información sensible de la memoria del kernel a través de una aplicación manipulada.
Jan Beulich discovered that the KVM svm hypervisor implementation in the Linux kernel did not properly catch Debug exceptions on AMD processors. An attacker in a guest virtual machine could use this to cause a denial of service (system crash) in the host OS. It was discovered that the ppp implementation in the Linux kernel did not ensure that certain slot numbers are valid. A local attacker with the privilege to call ioctl() on /dev/ppp could cause a denial of service (system crash). Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-10-21 CVE Reserved
- 2015-12-17 CVE Published
- 2024-08-06 CVE Updated
- 2025-06-24 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (14)
URL | Tag | Source |
---|---|---|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4b6184336ebb5c8dc1eae7f7ab46ee608a748b05 | X_refsource_confirm | |
http://www.openwall.com/lists/oss-security/2015/10/21/8 | Mailing List |
|
http://www.securityfocus.com/bid/77317 | Vdb Entry | |
http://www.securitytracker.com/id/1034896 | Vdb Entry | |
https://bugzilla.redhat.com/show_bug.cgi?id=1274728 | X_refsource_confirm | |
https://github.com/torvalds/linux/commit/4b6184336ebb5c8dc1eae7f7ab46ee608a748b05 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.ubuntu.com/usn/USN-2841-1 | 2016-12-07 | |
http://www.ubuntu.com/usn/USN-2841-2 | 2016-12-07 | |
http://www.ubuntu.com/usn/USN-2842-1 | 2016-12-07 | |
http://www.ubuntu.com/usn/USN-2842-2 | 2016-12-07 | |
http://www.ubuntu.com/usn/USN-2843-1 | 2016-12-07 | |
http://www.ubuntu.com/usn/USN-2843-2 | 2016-12-07 | |
http://www.ubuntu.com/usn/USN-2843-3 | 2016-12-07 | |
http://www.ubuntu.com/usn/USN-2844-1 | 2016-12-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | <= 4.3.2 Search vendor "Linux" for product "Linux Kernel" and version " <= 4.3.2" | - |
Affected
|