Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. Article

Joshua Powers
on 16 October 2018

Ubuntu Server development summary – 16 Oct 2018


The purpose of this communication is to provide a status update and highlights for any interesting subjects from the Ubuntu Server Team. If you would like to reach the server team, you can find us at the #ubuntu-server channel on Freenode. Alternatively, you can sign up and use the Ubuntu Server Team mailing list.

Spotlight: Call for testing certbot snap (Let’s Encrypt)

Configuring SSL certificates for webservers just got easier. Certbot is a Let’s Encrypt command-line client automating setup of SSL/TLS certificates. Robie Basak from the Ubuntu Server team published a snap package of certbot making it even easier to install certbot dependencies. The certbot snap call for testing shows just how easy it is. Happy hosting!

Spotlight: Cosmic Cuttlefish (18.10) release on Oct 18th

Ubuntu’s release cycle comes to a close this week and is final this Thursday. As Cosmic Cuttlefish is an interim release will supported until July 2019. See the detailed features of the Cosmic release.

cloud-init

  • Correct spelling in an error message (udevadm). [Katie McLaughlin]
  • tests: meta_data key changed to meta-data in ec2 instance-data.json (LP: #1797231)
  • tests: fix kvm integration test to assert flexible config-disk path (LP: #1797199)
  • tools: Add cloud-id command line utility
  • instance-data: Add standard keys platform and subplatform. Refactor ec2.
  • net: ignore nics that have "zero" mac address. (LP: #1796917)
  • tests: fix apt_configure_primary to be more flexible
  • Ubuntu: update sources.list to comment out deb-src entries. (LP: #74747)
  • release 18.4 (LP: #1795741)

curtin

  • vmtests: disable snapd/seeding to avoid boot hang
  • jenkins-runner: fix when using –filter only
  • distro: fix system_upgrade command using string instead of function (LP: #1796968)
  • Capture stdout when using lxc file push
  • vmtest: boot ephemeral with ‘ro’ on the kernel command line.
  • vmtest: Fix typo in skip-by-date.

Contact the Ubuntu Server team

Bug Work and Triage

Ubuntu Server Packages

Below is a summary of uploads to the development and supported releases. Current status of the Debian to Ubuntu merges is tracked on the Merge-o-Matic page. For a full list of recent merges with change logs please see the Ubuntu Server report.

Proposed Uploads to the Supported Releases

Please consider testing the following by enabling proposed, checking packages for update regressions, and making sure to mark affected bugs verified as fixed.

Total: 3

Uploads Released to the Supported Releases

Total: 24

Uploads to the Development Release

Total: 26

Related posts


David Beamonte
20 June 2025

Effective infrastructure automation to reduce data center costs

Cloud and server Article

To truly reduce OpEx, you must shift your perspective from seeing operations as custom, artisanal work to one where operations are standardized, automated, and repeatable.  In other words, commoditized. ...


Gabriel Aguiar Noury
19 June 2025

What are our partners building for device makers? Explore the highlights from Ubuntu IoT Day Singapore

Internet of Things Article

Our first Ubuntu IoT Day in Southeast Asia – and our first ever event in Singapore! It was long overdue, as several attendees were quick to remind us. Ubuntu has long been a quiet force in the region, powered by its rich ecosystem of innovators. More than 150 participants came together to represent Southeast Asia’s ...


ebarretto
18 June 2025

Fixes available for local privilege escalation vulnerability in libblockdev using udisks

Ubuntu Article

Qualys discovered two vulnerabilities in various Linux distributions which allow local attackers to escalate privileges. The first vulnerability (CVE-2025-6018) was found in the PAM configuration. This CVE does not impact default Ubuntu installations because of how the pam_systemd.so and pam_env.so modules are invoked. The second vulnerab ...