A few moments ago, Canonical published a new security notice for users of the Ubuntu 14.04 LTS (Trusty Tahr) operating system, informing them about the availability of updated Linux kernel packages that fix multiple security issues.

From Ubuntu Security Notice USN-2989-1 published today, June 1, 2016, it appears that a total of ten Linux kernel vulnerabilities discovered by various developers have been patched for the Ubuntu 14.04 LTS (Trusty Tahr) operating system, as well as any of its derivatives, official or unofficial.

The new Linux kernel version is linux-image-3.13.0-87 (3.13.0-87.133), available for all of the supported hardware architectures, including 64-bit, 32-bit, PPC (PowerPC) e500, PPC (PowerPC) e500mc, and PPP64 (PowerPC 64-bit). The low-latency and LPAE kernels has been updated too, so please install this version on your OS as soon as possible.

Ubuntu 14.04 LTS users need to update immediately

Ubuntu 16.04 LTS (Xenial Xerus) is already available as the latest and most advanced LTS (Long Term Support) version of Ubuntu Linux, but if you're still using the Ubuntu 14.04 LTS (Trusty Tahr) operating system on your computers, it is wise to update the kernel packages immediately.

To update, open the Unity Dash, search and launch the Software Updater utility, wait for the application to refresh the software repositories and find available updates, and then press the "Install Now" button to install the new kernel version, as well as any other updates that have been released lately.

Please note that you will need to reboot your computer after installing a kernel update, so do so immediately after the updated version has been installed. Ubuntu 14.04 LTS (Trusty Tahr) will be supported by Canonical with critical security patches and software updates for three more years, until April 2019.

Also, try to keep in mind that if you have third-party kernel modules installed on your Ubuntu 14.04 LTS system, you will need to rebuild them after installing the new Linux kernel version. In-depth details about the vulnerabilities fixed in this release can be accessed from the security notice published by Canonical on June 1, 2016.