CVE-2021-47397

5.5 MEDIUM

📋 TL;DR

This CVE describes a null pointer dereference vulnerability in the Linux kernel's SCTP (Stream Control Transmission Protocol) implementation. It allows attackers to cause a kernel panic or denial of service by sending specially crafted network packets. Systems running vulnerable Linux kernel versions with SCTP enabled are affected.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific versions not listed in CVE; check kernel commits for patched versions (e.g., stable branches like 5.10.x, 5.11.x).
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ✅ No
Notes: Only affects systems with SCTP protocol enabled; many distributions disable SCTP by default.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel crash leading to system reboot and denial of service, potentially disrupting critical services.

🟠

Likely Case

Localized denial of service affecting SCTP services or network connectivity on the targeted system.

🟢

If Mitigated

Minimal impact if SCTP is disabled or systems are not exposed to untrusted networks.

🌐 Internet-Facing: MEDIUM, as exploitation requires sending packets to SCTP-enabled services, which may be exposed.
🏢 Internal Only: LOW, as it typically requires network access to the vulnerable system, reducing exposure in internal networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting SCTP packets; no public proof-of-concept known, but syzbot reports indicate it's triggerable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patched in kernel commits referenced in CVE (e.g., 77bc7dcf0fcc, 8180611c238e).

Vendor Advisory: https://git.kernel.org/stable/c/77bc7dcf0fcc1519341a91788d7a2914fcfddf6d

Restart Required: Yes

Instructions:

1. Update Linux kernel to a patched version from your distribution's repository. 2. Reboot the system to apply the kernel update.

🔧 Temporary Workarounds

Disable SCTP kernel module

linux

Prevents exploitation by unloading the SCTP module if not needed.

sudo modprobe -r sctp
echo 'blacklist sctp' | sudo tee /etc/modprobe.d/blacklist-sctp.conf

🧯 If You Can't Patch

  • Restrict network access to SCTP ports (default 9899, 9900) using firewalls.
  • Monitor systems for crashes or unusual SCTP traffic and isolate affected machines.

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if SCTP is enabled: 'uname -r' and 'lsmod | grep sctp'.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is patched by comparing to distribution advisories and ensure SCTP module is not loaded or updated.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs in /var/log/kern.log or dmesg output indicating null pointer dereference in SCTP functions.

Network Indicators:

  • Unusual SCTP packet traffic to vulnerable systems, especially malformed packets.

SIEM Query:

Example: 'source="kern.log" AND "null-ptr-deref" AND "sctp"'

🔗 References

📤 Share & Export