Skip to main content
  1. Blog
  2. Article

Canonical
on 5 November 2019


Canonical is happy to announce that all community users are entitled to a free Ubuntu Advantage for Infrastructure account for access to Extended Security Maintenance (ESM) and Kernel Livepatch* for Ubuntu 14.04 LTS (Trusty Tahr) for up to three machines, and up to 50 machines for all official Ubuntu Members. ESM provides fixes for high and critical CVEs for the most commonly used server packages in the Ubuntu main archive, and Livepatch permits users to apply critical kernel patches without rebooting. Access to these services ensures systems with longer development cycles or production lifespans remain patched against security vulnerabilities until 2022.

This access comes alongside an updated Ubuntu Advantage (UA) client that provides users a more efficient and consistent CLI (command-line interface) via single-token access to UA Infrastructure services. The UA client comes pre-installed on Ubuntu systems, with the updated client now available for Ubuntu 14.04 LTS users and coming soon for Ubuntu 16.04 LTS and 18.04 LTS.

For users with updated 14.04 systems, simply run the ua command to quickly get started with key security and compliance services and tools.

Existing UA Infrastructure customers can continue using the previous client without interruption. However, updating to the new client is recommended in order to take advantage of the more streamlined experience. 

For Ubuntu 14.04 users and UA Infrastructure customers to get started with UA client, visit ubuntu.com/advantage and please contact support** with any questions. To learn more and subscribe to UA Infrastructure, visit ubuntu.com/advantage.

*Requires HWE kernel
**Only Ubuntu Advantage for Infrastructure customers will have access to the support contact link via the Canonical support portal. If you are not a UA Infrastructure customer, please visit ubuntu.com/advantage to subscribe and get started with the new UA Client.

Related posts


Luci Stanescu
19 May 2026

CVE-2026-46333 (ssh-keysign-pwn) Linux kernel vulnerability mitigations

Ubuntu Article

An information disclosure security vulnerability in the Linux kernel was publicly disclosed on May 15th, 2026. The vulnerability was reported by Qualys and fixed in the mainline Linux kernel tree. A proof-of-concept exploit was published soon after public disclosure. The ID CVE-2026-46333 was assigned, but the vulnerability is also referr ...


Miha Purg
15 May 2026

Finding the blind spot: How Canonical hunts logic flaws with AI

AI Article

AI is accelerating and improving how security engineers find and fix vulnerabilities. A new tool developed and used at Canonical, called Redhound, has already uncovered three critical logic vunerabilites, paving the way for a more secure software landscape. ...


Luci Stanescu
14 May 2026

Fragnesia Linux kernel local privilege escalation vulnerability mitigations

Ubuntu Article

A local privilege escalation (LPE) vulnerability affecting the Linux kernel has been publicly disclosed on May 13, 2026. The vulnerability does not have a CVE ID published, but is referred to as “Fragnesia.”  The vulnerability affects multiple Linux distributions, including all Ubuntu releases. The affected components are the Linux kernel ...