Public bug reported:

I just SSH'd into my desktop, and was greeted with an additional _182_
lines of MOTD output thanks to fwupd (this content is in
/run/private/motd.d/85-fwupd, which is how I know fwupd is at fault).
There are a few problems here:

* The same content appears to be repeated 3 times
* It has no indication of what this tree output is, you just have to guess that 
it's to do with firmware updates
* The tree output itself is very wasteful of vertical space; it take 3 lines to 
give me the name of my device, and ~20 before I can work out that this is even 
describing updates
* It has no call to action; I have no idea how I would apply these updates to 
my system

I've included my full MOTD to demonstrate just how bad this looks:

Welcome to Ubuntu Focal Fossa (development branch) (GNU/Linux
5.4.5-050405-generic x86_64)

 * Documentation:  https://help.ubuntu.com
 * Management:     https://landscape.canonical.com
 * Support:        https://ubuntu.com/advantage

 * Overheard at KubeCon: "microk8s.status just blew my mind".

     https://microk8s.io/docs/commands#microk8s.status
B450M DS3H
│
└─Unifying Receiver:
  │   Device ID:           cf3685ba249d3d98602047341d6f5a5556a6ac05
  │   Summary:             A miniaturised USB wireless receiver
  │   Current version:     RQR12.07_B0029
  │   Bootloader Version:  BOT01.02_B0014
  │   Vendor:              Logitech, Inc. (USB:0x046D)
  │   Install Duration:    30 seconds
  │   GUIDs:               9d131a0c-a606-580f-8eda-80587250b8d6
  │                        fcf55bf5-767b-51ce-9c17-f6f538c4ee9f
  │                        279ed287-3607-549e-bacc-f873bb9838c4
  │   Device Flags:        • Updatable
  │                        • Supported on remote server
  │ 
  ├─Unifying Receiver (RQR12) Device Update:
  │     New version:       RQR12.10_B0032
  │     Remote ID:         lvfs
  │     Summary:           Firmware for the Logitech Unifying Receiver 
(RQR12.xx)
  │     License:           Proprietary
  │     Size:              56.8 kB
  │     Vendor:            Logitech
  │     Duration:          30 seconds
  │     Flags:             is-upgrade
  │     Description:       This release addresses an encrypted keystroke 
injection vulnerability sent by pointing devices. The vulnerability is complex 
to replicate and would require a hacker to be physically close to a target.
  │     
  │     A few of Logitech's devices used to send select buttons in an 
unencrypted way, and in an effort to protect against this vulnerability, 
Logitech removed the feature. Affected hardware is:
  │     
  │      • Wireless Mouse M335
  │      • Zone Touch Mouse T400
  │      • Wireless Mouse M545
  │      • Wireless Mouse M560
  │      • Touch Mouse M600
  │      • Touch Mouse T620
  │      • Wireless Rechargeable Touchpad T650
  │     
  │     Although Logitech does not recommend it, these features may be 
re-activated by keeping/downgrading the receiver to an older firmware.
  │   
  └─Unifying Receiver (RQR12) Device Update:
        New version:       RQR12.08_B0030
        Remote ID:         lvfs
        Summary:           Firmware for the Logitech Unifying Receiver 
(RQR12.xx)
        License:           Proprietary
        Size:              72.7 kB
        Vendor:            Logitech
        Duration:          30 seconds
        Flags:             is-upgrade
        Description:       This release addresses an encrypted keystroke 
injection issue known as Bastille security issue #13. The vulnerability is 
complex to replicate and would require a hacker to be physically close to a 
target.
        
        A few of Logitech's devices used to send select buttons in an 
unencrypted way, and in an effort to protect against this vulnerability, 
Logitech removed the feature. Affected hardware is:
        
         • Wireless Mouse M335
         • Zone Touch Mouse T400
         • Wireless Mouse M545
         • Wireless Mouse M560
         • Touch Mouse M600
         • Touch Mouse T620
         • Wireless Rechargeable Touchpad T650
        
        Although Logitech does not recommend it, these features may be 
re-activated by keeping/downgrading the receiver to an older firmware.
      
B450M DS3H
│
└─Unifying Receiver:
  │   Device ID:           cf3685ba249d3d98602047341d6f5a5556a6ac05
  │   Summary:             A miniaturised USB wireless receiver
  │   Current version:     RQR12.07_B0029
  │   Bootloader Version:  BOT01.02_B0014
  │   Vendor:              Logitech, Inc. (USB:0x046D)
  │   Install Duration:    30 seconds
  │   GUIDs:               9d131a0c-a606-580f-8eda-80587250b8d6
  │                        fcf55bf5-767b-51ce-9c17-f6f538c4ee9f
  │                        279ed287-3607-549e-bacc-f873bb9838c4
  │   Device Flags:        • Updatable
  │                        • Supported on remote server
  │ 
  ├─Unifying Receiver (RQR12) Device Update:
  │     New version:       RQR12.10_B0032
  │     Remote ID:         lvfs
  │     Summary:           Firmware for the Logitech Unifying Receiver 
(RQR12.xx)
  │     License:           Proprietary
  │     Size:              56.8 kB
  │     Vendor:            Logitech
  │     Duration:          30 seconds
  │     Flags:             is-upgrade
  │     Description:       This release addresses an encrypted keystroke 
injection vulnerability sent by pointing devices. The vulnerability is complex 
to replicate and would require a hacker to be physically close to a target.
  │     
  │     A few of Logitech's devices used to send select buttons in an 
unencrypted way, and in an effort to protect against this vulnerability, 
Logitech removed the feature. Affected hardware is:
  │     
  │      • Wireless Mouse M335
  │      • Zone Touch Mouse T400
  │      • Wireless Mouse M545
  │      • Wireless Mouse M560
  │      • Touch Mouse M600
  │      • Touch Mouse T620
  │      • Wireless Rechargeable Touchpad T650
  │     
  │     Although Logitech does not recommend it, these features may be 
re-activated by keeping/downgrading the receiver to an older firmware.
  │   
  └─Unifying Receiver (RQR12) Device Update:
        New version:       RQR12.08_B0030
        Remote ID:         lvfs
        Summary:           Firmware for the Logitech Unifying Receiver 
(RQR12.xx)
        License:           Proprietary
        Size:              72.7 kB
        Vendor:            Logitech
        Duration:          30 seconds
        Flags:             is-upgrade
        Description:       This release addresses an encrypted keystroke 
injection issue known as Bastille security issue #13. The vulnerability is 
complex to replicate and would require a hacker to be physically close to a 
target.
        
        A few of Logitech's devices used to send select buttons in an 
unencrypted way, and in an effort to protect against this vulnerability, 
Logitech removed the feature. Affected hardware is:
        
         • Wireless Mouse M335
         • Zone Touch Mouse T400
         • Wireless Mouse M545
         • Wireless Mouse M560
         • Touch Mouse M600
         • Touch Mouse T620
         • Wireless Rechargeable Touchpad T650
        
        Although Logitech does not recommend it, these features may be 
re-activated by keeping/downgrading the receiver to an older firmware.
      
B450M DS3H
│
└─Unifying Receiver:
  │   Device ID:           cf3685ba249d3d98602047341d6f5a5556a6ac05
  │   Summary:             A miniaturised USB wireless receiver
  │   Current version:     RQR12.07_B0029
  │   Bootloader Version:  BOT01.02_B0014
  │   Vendor:              Logitech, Inc. (USB:0x046D)
  │   Install Duration:    30 seconds
  │   GUIDs:               9d131a0c-a606-580f-8eda-80587250b8d6
  │                        fcf55bf5-767b-51ce-9c17-f6f538c4ee9f
  │                        279ed287-3607-549e-bacc-f873bb9838c4
  │   Device Flags:        • Updatable
  │                        • Supported on remote server
  │ 
  ├─Unifying Receiver (RQR12) Device Update:
  │     New version:       RQR12.10_B0032
  │     Remote ID:         lvfs
  │     Summary:           Firmware for the Logitech Unifying Receiver 
(RQR12.xx)
  │     License:           Proprietary
  │     Size:              56.8 kB
  │     Vendor:            Logitech
  │     Duration:          30 seconds
  │     Flags:             is-upgrade
  │     Description:       This release addresses an encrypted keystroke 
injection vulnerability sent by pointing devices. The vulnerability is complex 
to replicate and would require a hacker to be physically close to a target.
  │     
  │     A few of Logitech's devices used to send select buttons in an 
unencrypted way, and in an effort to protect against this vulnerability, 
Logitech removed the feature. Affected hardware is:
  │     
  │      • Wireless Mouse M335
  │      • Zone Touch Mouse T400
  │      • Wireless Mouse M545
  │      • Wireless Mouse M560
  │      • Touch Mouse M600
  │      • Touch Mouse T620
  │      • Wireless Rechargeable Touchpad T650
  │     
  │     Although Logitech does not recommend it, these features may be 
re-activated by keeping/downgrading the receiver to an older firmware.
  │   
  └─Unifying Receiver (RQR12) Device Update:
        New version:       RQR12.08_B0030
        Remote ID:         lvfs
        Summary:           Firmware for the Logitech Unifying Receiver 
(RQR12.xx)
        License:           Proprietary
        Size:              72.7 kB
        Vendor:            Logitech
        Duration:          30 seconds
        Flags:             is-upgrade
        Description:       This release addresses an encrypted keystroke 
injection issue known as Bastille security issue #13. The vulnerability is 
complex to replicate and would require a hacker to be physically close to a 
target.
        
        A few of Logitech's devices used to send select buttons in an 
unencrypted way, and in an effort to protect against this vulnerability, 
Logitech removed the feature. Affected hardware is:
        
         • Wireless Mouse M335
         • Zone Touch Mouse T400
         • Wireless Mouse M545
         • Wireless Mouse M560
         • Touch Mouse M600
         • Touch Mouse T620
         • Wireless Rechargeable Touchpad T650
        
        Although Logitech does not recommend it, these features may be 
re-activated by keeping/downgrading the receiver to an older firmware.

ProblemType: Bug
DistroRelease: Ubuntu 20.04
Package: fwupd 1.3.5-1
Uname: Linux 5.4.5-050405-generic x86_64
NonfreeKernelModules: nvidia_modeset nvidia
ApportVersion: 2.20.11-0ubuntu15
Architecture: amd64
Date: Fri Jan 10 08:32:23 2020
InstallationDate: Installed on 2019-05-07 (247 days ago)
InstallationMedia: Ubuntu 18.04.2 LTS "Bionic Beaver" - Release amd64 (20190210)
SourcePackage: fwupd
UpgradeStatus: Upgraded to focal on 2019-11-15 (55 days ago)

** Affects: fwupd (Ubuntu)
     Importance: Undecided
         Status: New


** Tags: amd64 apport-bug focal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1859180

Title:
  Uninformative, repetitive and extremely long MOTD message

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/fwupd/+bug/1859180/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to