Canonical
on 7 March 2019

How to ensure the ongoing security and compliance of Ubuntu 14.04 LTS ‘Trusty Tahr’


This article was last updated 5 year s ago.

Ubuntu 14.04 LTS the ‘Trusty Tahr’ is a reliable and intuitive release, adopted by many enterprises for cloud infrastructure when released in April 2014. However, as 14.04 reaches the end of its five-year, Standard Security Maintenance, LTS window in April 2019, support for the OS is transitioning into a new phase – Extended Security Maintenance (ESM).

With this transition to ESM, Ubuntu OS users and organisations are encouraged to upgrade to a later release in order to gain access to the latest and greatest features of Ubuntu. Since the release of Ubuntu 14.04, there have been two subsequent Ubuntu LTS releases: Ubuntu 16.04 ‘Xenial Xerus’ and Ubuntu 18.04 LTS ‘Bionic Beaver’.

Initially launched with the transition of Ubuntu 12.04 LTS, ESM brings critical security patches beyond the LTS date of Ubuntu releases. The offering allows organisations to safely and securely plan application upgrades in a failsafe environment, a factor that is often cited as the main value for its adoption. And for those who cannot upgrade at this stage due to complications and cost, ESM protects this release from potential vulnerabilities until an organisation can upgrade.

The availability of ESM for Ubuntu 14.04 means that the transition of Ubuntu 14.04 LTS Trusty Tahr to ESM in April should not negatively impact an organisation’s security and compliance efforts.

On Tuesday, 12 March, Ubuntu Security Manager, Joe McManus will cover everything you need to know about this new support phase in our 14.04-focused webinar, sharing how to achieve secure and compliants systems with ESM.

In this webinar you will learn:

  • What the transition to Extended Security Maintenance for Ubuntu 14.04 LTS means
  • Guidance on updating 14.04 LTS systems to 16.04 LTS or 18.04 LTS
  • Q&A with Ubuntu Security Manager, Joe McManus

Register for the webinar


Newsletter
signup

Get the latest Ubuntu news and updates in your inbox.

By submitting this form, I confirm that I have read and agree to Canonical's Privacy Policy.

Related posts


Lech Sandecki
23 October 2024

6 facts for CentOS users who are holding on

Article Cloud and server

Considering migrating to Ubuntu from other Linux platforms, such as CentOS? Find six useful facts to get started!

Lech Sandecki
23 October 2024


Rajan Patel
27 June 2025

How is Livepatch safeguarded against bad actors?

Article Security

What safeguards the Livepatch security patching solution against bad actors and malicious code masquerading as an update? Learn about Secure Boot and module signing.

Rajan Patel
27 June 2025


ebarretto
18 June 2025

Fixes available for local privilege escalation vulnerability in libblockdev using udisks

Article Ubuntu

Qualys discovered two vulnerabilities in various Linux distributions which allow local attackers to escalate privileges. The first vulnerability (CVE-2025-6018) was found in the PAM configuration. This CVE does not impact default Ubuntu installations because of how the pam_systemd.so and pam_env.so modules are invoked....

ebarretto
18 June 2025