Skip to main content
  1. Blog
  2. Article

Canonical
on 7 March 2019

How to ensure the ongoing security and compliance of Ubuntu 14.04 LTS ‘Trusty Tahr’


Ubuntu 14.04 LTS the ‘Trusty Tahr’ is a reliable and intuitive release, adopted by many enterprises for cloud infrastructure when released in April 2014. However, as 14.04 reaches the end of its five-year, Standard Security Maintenance, LTS window in April 2019, support for the OS is transitioning into a new phase – Extended Security Maintenance (ESM).

With this transition to ESM, Ubuntu OS users and organisations are encouraged to upgrade to a later release in order to gain access to the latest and greatest features of Ubuntu. Since the release of Ubuntu 14.04, there have been two subsequent Ubuntu LTS releases: Ubuntu 16.04 ‘Xenial Xerus’ and Ubuntu 18.04 LTS ‘Bionic Beaver’.

Initially launched with the transition of Ubuntu 12.04 LTS, ESM brings critical security patches beyond the LTS date of Ubuntu releases. The offering allows organisations to safely and securely plan application upgrades in a failsafe environment, a factor that is often cited as the main value for its adoption. And for those who cannot upgrade at this stage due to complications and cost, ESM protects this release from potential vulnerabilities until an organisation can upgrade.

The availability of ESM for Ubuntu 14.04 means that the transition of Ubuntu 14.04 LTS Trusty Tahr to ESM in April should not negatively impact an organisation’s security and compliance efforts.

On Tuesday, 12 March, Ubuntu Security Manager, Joe McManus will cover everything you need to know about this new support phase in our 14.04-focused webinar, sharing how to achieve secure and compliants systems with ESM.

In this webinar you will learn:

  • What the transition to Extended Security Maintenance for Ubuntu 14.04 LTS means
  • Guidance on updating 14.04 LTS systems to 16.04 LTS or 18.04 LTS
  • Q&A with Ubuntu Security Manager, Joe McManus

Register for the webinar

Related posts


Lidia Luna Puerta
14 January 2026

How to build DORA-ready infrastructure with verifiable provenance and reliable support

Ubuntu Article

DORA requires organizations to know what they run, where it came from, and how it’s maintained. Learn how to build infrastructure with verifiable provenance. ...


Luci Stanescu
19 May 2026

CVE-2026-46333 (ssh-keysign-pwn) Linux kernel vulnerability mitigations

Ubuntu Article

An information disclosure security vulnerability in the Linux kernel was publicly disclosed on May 15th, 2026. The vulnerability was reported by Qualys and fixed in the mainline Linux kernel tree. A proof-of-concept exploit was published soon after public disclosure. The ID CVE-2026-46333 was assigned, but the vulnerability is also referr ...


Miha Purg
15 May 2026

Finding the blind spot: How Canonical hunts logic flaws with AI

AI Article

AI is accelerating and improving how security engineers find and fix vulnerabilities. A new tool developed and used at Canonical, called Redhound, has already uncovered three critical logic vunerabilites, paving the way for a more secure software landscape. ...