Public bug reported:

[Availability]
The package is in proposed, pending a correction to Architecture to permit it 
to migrate to multiverse (LP: #1884748).

[Rationale]
The package is required for updating the boot EEPROM on the Raspberry Pi 4.

[Security]
I am not aware of any open CVEs against the tools in rpi-eeprom.

[Quality assurance]
The package is extensively used upstream on Raspbian, and is obviously actively 
maintained there. There is no meaningful test suite included in the package, 
but the contents of the package are regularly exercised in image testing (and 
boot EEPROM testing).

[UI standards]
Manual pages are included for both utilties included in the package 
(rpi-eeprom-config and rpi-eeprom-update), but localization is missing from 
both utilities at present. However, most users will never use these utilities 
directly. Rather, they are typically launched by a systemd service on boot 
which automatically applies new versions of the boot EEPROM.

[Dependencies]
The package depends on binutils, python3, and pciutils, all of which are 
already in main. It also depends on linux-firmware-raspi2 and 
libraspberrypi-bin which are the subject of other MIRs (LP: #1867813, LP: 
#1895133).

[Standards compliance]
The package installs its scripts under /usr/bin.

[Maintenance]
The package is maintained by the Ubuntu Foundations team.

[Background information]
As this is a dependency for keeping the boot EEPROM on the Raspberry Pi 4 up to 
date, the intention is to install this by default in all pi-related images 
going forward.

** Affects: rpi-eeprom (Ubuntu)
     Importance: Undecided
         Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1895137

Title:
  [MIR] rpi-eeprom

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/rpi-eeprom/+bug/1895137/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to