Skip to main content
  1. Blog
  2. Article

Canonical
on 16 August 2017

Ubuntu Foundations Development Summary – August 16, 2017


This newsletter is to provide a status update from the Ubuntu Foundations Team. There will also be highlights provided for any interesting subjects the team may be working on. If you would like to reach the Foundations team, you can find us at the #ubuntu-devel channel on freenode.

Highlights

The State of the Archive

  • After no small amount of effort, the perl 5.26 and gcc-7 transitions migrated to artful on the 10th, unblocking many of the packages that had been stuck in -proposed.
  • As GCC 7 is now the default compiler in artful, the build failures reported at https://qa.ubuntuwire.org/ftbfs/rebuilds/test-rebuild-20170706-gcc7-artful.html now apply to 17.10. Please help us resolve these failing packages for the release.
  • Next in line we have the Qt 5.9 transition. Look for more news about this next week!

Upcoming Ubuntu Dates

Weekly Meeting

Related posts


Miguel Divo
22 May 2026

Decoding design: How design and engineering thrive together in open source

Design Design

Open source thrives on engineering-driven processes. Fast feedback loops, terminal tools, Git workflows: they’re the lifeblood of how we build software in the open. But for software to truly excel, we need to create user experiences that empower people to use them. I wanted to bring this conversation into the spotlight as part of Canonica ...


Abdelrahman Hosny
21 May 2026

Developing web apps with local LLM inference

AI Article

I’ve yet to meet a developer that enjoys working with metered AI APIs. The need to pay for every API call in development works in direct opposition to the ethos of rapid iteration, and it’s easy for the costs to get out of hand. That’s why Canonical has created a different approach to building AI-powered ...


Luci Stanescu
21 May 2026

PinTheft Linux kernel vulnerability mitigation

Ubuntu Article

A local privilege escalation (LPE) security vulnerability in the Linux kernel, codename “PinTheft,” was publicly disclosed on May 19, 2026. The vulnerability was fixed in the mainline Linux kernel tree. A proof-of-concept exploit was published along with public disclosure. The vulnerability does not have a CVE ID assigned at the moment; o ...