Skip to main content
  1. Blog
  2. Article

Canonical
on 5 November 2019


Canonical is happy to announce that all community users are entitled to a free Ubuntu Advantage for Infrastructure account for access to Extended Security Maintenance (ESM) and Kernel Livepatch* for Ubuntu 14.04 LTS (Trusty Tahr) for up to three machines, and up to 50 machines for all official Ubuntu Members. ESM provides fixes for high and critical CVEs for the most commonly used server packages in the Ubuntu main archive, and Livepatch permits users to apply critical kernel patches without rebooting. Access to these services ensures systems with longer development cycles or production lifespans remain patched against security vulnerabilities until 2022.

This access comes alongside an updated Ubuntu Advantage (UA) client that provides users a more efficient and consistent CLI (command-line interface) via single-token access to UA Infrastructure services. The UA client comes pre-installed on Ubuntu systems, with the updated client now available for Ubuntu 14.04 LTS users and coming soon for Ubuntu 16.04 LTS and 18.04 LTS.

For users with updated 14.04 systems, simply run the ua command to quickly get started with key security and compliance services and tools.

Existing UA Infrastructure customers can continue using the previous client without interruption. However, updating to the new client is recommended in order to take advantage of the more streamlined experience. 

For Ubuntu 14.04 users and UA Infrastructure customers to get started with UA client, visit ubuntu.com/advantage and please contact support** with any questions. To learn more and subscribe to UA Infrastructure, visit ubuntu.com/advantage.

*Requires HWE kernel
**Only Ubuntu Advantage for Infrastructure customers will have access to the support contact link via the Canonical support portal. If you are not a UA Infrastructure customer, please visit ubuntu.com/advantage to subscribe and get started with the new UA Client.

Related posts


ijlal-loutfi
6 March 2026

Sovereign clouds: enhanced data security with confidential computing 

Confidential computing Article

Increasingly, enterprises are interested in improving their level of control over their data, achieving digital sovereignty, and even building their own sovereign cloud. However, this means moving beyond thinking about just where your data is stored to thinking about the entire data lifecycle.  In this blog, we cover the differences betwe ...


Benjamin Ryzman
24 February 2026

Building quantum-safe telecom infrastructure for 5G and beyond

private mobile network Article

coRAN Labs and Canonical at MWC Barcelona 2026 At MWC Barcelona 2026, coRAN Labs and Canonical are presenting a working demonstration of a cloud-native, quantum-safe telecom platform for 5G and beyond 5G networks. This is not a conceptual exercise. It is a full 5G System (5GS) deployment with post-quantum cryptography embedded across the ...


Lidia Luna Puerta
14 January 2026

How to build DORA-ready infrastructure with verifiable provenance and reliable support

Ubuntu Article

DORA requires organizations to know what they run, where it came from, and how it’s maintained. Learn how to build infrastructure with verifiable provenance. ...