USN-2870-2 page appears to have typos

Bug #1537237 reported by Jeff Moore
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
USN Website
Invalid
Undecided
Unassigned

Bug Description

I have my doubts about this USN-2870-2 page:

    http://www.ubuntu.com/usn/usn-2870-2/

The title says "Trusty HWE" (Trusty being Ubuntu 14.04 LTS), and the
page refers to kernel version 3.13.0-76 (which is the kernel version
Ubuntu 14.04.3 LTS machines will update to, given the opportunity),
but multiple places in the page refer to the page as being about
"Ubuntu 12.04 LTS" (which we know as Precise, and whose kernels tend
to be in the 3.2 family).

So... are there boilerplate-related typos in this page, or am I just
hopelessly confused?

Revision history for this message
Steve Beattie (sbeattie) wrote :

Hi Jeff,

The Trusty HWE (Hardware Enablement) kernels (aka linux-lts-trusty kernels) are the 14.04 LTS kernels made available in the 12.04 LTS updates and security archives, to give people who want to continue using Ubuntu 12.04 LTS access to kernels that would support hardware that become generally available after the 12.04 LTS release. Additionally, the Trusty HWE kernel is the default kernel installed from the 12.04.5 LTS point release install media.

https://wiki.ubuntu.com/Kernel/LTSEnablementStack describes it in more detail.

Thanks for the query, and I agree that it is a bit confusing and not as straightforward as it could be.

Changed in usn-website:
status: New → Invalid
Steve Beattie (sbeattie)
information type: Proprietary → Public
Revision history for this message
Jeff Moore (jbmubu) wrote :

Thanks for the clarification, and sorry for the unnecessary report.

I wonder, though, if others are being confused in the same way and if it might be useful to throw in a reference to this explanation.

I expect that a lot of people unfamiliar with what the HWE kernel channels are (like me) might (like me) happen upon these USN notes in response to a big, broadly-publicized kernel bug.

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.