High
Linux Kernel is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the Transparent Inter Process Communication (TIPC) module. By sending a specially-crafted domain record containing an arbitrary payload, a remote attacker could overflow a buffer and execute arbitrary code or cause a denial of service condition on the system.
Linux
Refer to Linux Kernel GIT Repository for patch, upgrade or suggested workaround information