Canonical has patched two Linux Kernel Vulnerabilities in Ubuntu 14.04 LTS. Upgrade Ubuntu 14.04 Kernel, as advised by the Ubuntu Security Notice USN-2588-1.
A stack overflow was discovered in the the microcode loader for the intel x86 platform. A local attacker could exploit this flaw to cause a denial of service (kernel crash) or to potentially execute code with kernel privileges. (CVE-2015-2666)
It was discovered that the Linux kernel’s IPv6 networking stack has a flaw that allows using route advertisement (RA) messages to set the ‘hop_limit’ to values that are too low. An unprivileged attacker on a local network could exploit this flaw to cause a denial of service (IPv6 messages dropped). (CVE-2015-2922)
Update Instructions
The problem can be corrected by updating your system to the following package version:
Ubuntu 14.04 LTS:
linux-image-3.13.0-51-powerpc64-emb 3.13.0-51.84
linux-image-3.13.0-51-powerpc64-smp 3.13.0-51.84
linux-image-3.13.0-51-generic 3.13.0-51.84
linux-image-3.13.0-51-powerpc-smp 3.13.0-51.84
linux-image-3.13.0-51-powerpc-e500 3.13.0-51.84
linux-image-3.13.0-51-generic-lpae 3.13.0-51.84
linux-image-3.13.0-51-powerpc-e500mc 3.13.0-51.84
linux-image-3.13.0-51-lowlatency 3.13.0-51.84
To update your system, open the Unity Dash, search for Software Updater. When it opens, search for it to reload the updated repositories and new updates. Once the updates list is displayed, apply all available patches to upgrade the system.
You can also run the following commands to upgrade the system:
sudo apt-get update
sudo apt-get dist-upgrade
Please note that after a standard system update you need to reboot your computer to make all the necessary changes.