CVE-2019-19060

7.5 HIGH

📋 TL;DR

This vulnerability is a memory leak in the Linux kernel's ADIS IMU driver that allows attackers to cause denial of service by consuming all available memory. It affects Linux systems using the affected driver before kernel version 5.3.9. The vulnerability requires local access to exploit.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Linux kernel versions before 5.3.9
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using the ADIS IMU driver (drivers/iio/imu/adis*). Many embedded/IoT systems use this driver for inertial measurement units.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system unavailability due to memory exhaustion, requiring hard reboot and potential data loss.

🟠

Likely Case

Degraded system performance leading to application failures and service disruption.

🟢

If Mitigated

Limited impact with proper memory monitoring and process isolation in place.

🌐 Internet-Facing: LOW - Requires local access to exploit, not remotely exploitable.
🏢 Internal Only: MEDIUM - Local attackers or malicious processes could cause denial of service.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and ability to trigger the vulnerable function repeatedly. No public exploit code has been documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel 5.3.9 and later

Vendor Advisory: https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9

Restart Required: Yes

Instructions:

1. Update Linux kernel to version 5.3.9 or later. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel package. 3. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable ADIS IMU driver

linux

Prevent loading of vulnerable driver module

echo 'blacklist adis' >> /etc/modprobe.d/blacklist.conf
rmmod adis

Memory usage monitoring

linux

Monitor memory consumption and restart affected processes

# Set up monitoring with tools like atop, htop, or custom scripts

🧯 If You Can't Patch

  • Implement strict access controls to limit who can access devices using ADIS IMU driver
  • Deploy memory monitoring and alerting to detect memory exhaustion patterns

🔍 How to Verify

Check if Vulnerable:

Check kernel version: uname -r. If version is < 5.3.9 and ADIS driver is loaded (lsmod | grep adis), system is vulnerable.

Check Version:

uname -r

Verify Fix Applied:

After update, verify kernel version is ≥ 5.3.9 with uname -r and check commit ab612b1daf41 is included.

📡 Detection & Monitoring

Log Indicators:

  • Kernel OOM (Out of Memory) messages in /var/log/kern.log or dmesg
  • Rapid memory consumption by kernel processes

Network Indicators:

  • None - local vulnerability only

SIEM Query:

source="kernel" AND ("out of memory" OR "oom") AND process="adis"

🔗 References

📤 Share & Export