Public bug reported: I just SSH'd into my desktop, and was greeted with an additional _182_ lines of MOTD output thanks to fwupd (this content is in /run/private/motd.d/85-fwupd, which is how I know fwupd is at fault). There are a few problems here:
* The same content appears to be repeated 3 times * It has no indication of what this tree output is, you just have to guess that it's to do with firmware updates * The tree output itself is very wasteful of vertical space; it take 3 lines to give me the name of my device, and ~20 before I can work out that this is even describing updates * It has no call to action; I have no idea how I would apply these updates to my system I've included my full MOTD to demonstrate just how bad this looks: Welcome to Ubuntu Focal Fossa (development branch) (GNU/Linux 5.4.5-050405-generic x86_64) * Documentation: https://help.ubuntu.com * Management: https://landscape.canonical.com * Support: https://ubuntu.com/advantage * Overheard at KubeCon: "microk8s.status just blew my mind". https://microk8s.io/docs/commands#microk8s.status B450M DS3H │ └─Unifying Receiver: │ Device ID: cf3685ba249d3d98602047341d6f5a5556a6ac05 │ Summary: A miniaturised USB wireless receiver │ Current version: RQR12.07_B0029 │ Bootloader Version: BOT01.02_B0014 │ Vendor: Logitech, Inc. (USB:0x046D) │ Install Duration: 30 seconds │ GUIDs: 9d131a0c-a606-580f-8eda-80587250b8d6 │ fcf55bf5-767b-51ce-9c17-f6f538c4ee9f │ 279ed287-3607-549e-bacc-f873bb9838c4 │ Device Flags: • Updatable │ • Supported on remote server │ ├─Unifying Receiver (RQR12) Device Update: │ New version: RQR12.10_B0032 │ Remote ID: lvfs │ Summary: Firmware for the Logitech Unifying Receiver (RQR12.xx) │ License: Proprietary │ Size: 56.8 kB │ Vendor: Logitech │ Duration: 30 seconds │ Flags: is-upgrade │ Description: This release addresses an encrypted keystroke injection vulnerability sent by pointing devices. The vulnerability is complex to replicate and would require a hacker to be physically close to a target. │ │ A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is: │ │ • Wireless Mouse M335 │ • Zone Touch Mouse T400 │ • Wireless Mouse M545 │ • Wireless Mouse M560 │ • Touch Mouse M600 │ • Touch Mouse T620 │ • Wireless Rechargeable Touchpad T650 │ │ Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware. │ └─Unifying Receiver (RQR12) Device Update: New version: RQR12.08_B0030 Remote ID: lvfs Summary: Firmware for the Logitech Unifying Receiver (RQR12.xx) License: Proprietary Size: 72.7 kB Vendor: Logitech Duration: 30 seconds Flags: is-upgrade Description: This release addresses an encrypted keystroke injection issue known as Bastille security issue #13. The vulnerability is complex to replicate and would require a hacker to be physically close to a target. A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is: • Wireless Mouse M335 • Zone Touch Mouse T400 • Wireless Mouse M545 • Wireless Mouse M560 • Touch Mouse M600 • Touch Mouse T620 • Wireless Rechargeable Touchpad T650 Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware. B450M DS3H │ └─Unifying Receiver: │ Device ID: cf3685ba249d3d98602047341d6f5a5556a6ac05 │ Summary: A miniaturised USB wireless receiver │ Current version: RQR12.07_B0029 │ Bootloader Version: BOT01.02_B0014 │ Vendor: Logitech, Inc. (USB:0x046D) │ Install Duration: 30 seconds │ GUIDs: 9d131a0c-a606-580f-8eda-80587250b8d6 │ fcf55bf5-767b-51ce-9c17-f6f538c4ee9f │ 279ed287-3607-549e-bacc-f873bb9838c4 │ Device Flags: • Updatable │ • Supported on remote server │ ├─Unifying Receiver (RQR12) Device Update: │ New version: RQR12.10_B0032 │ Remote ID: lvfs │ Summary: Firmware for the Logitech Unifying Receiver (RQR12.xx) │ License: Proprietary │ Size: 56.8 kB │ Vendor: Logitech │ Duration: 30 seconds │ Flags: is-upgrade │ Description: This release addresses an encrypted keystroke injection vulnerability sent by pointing devices. The vulnerability is complex to replicate and would require a hacker to be physically close to a target. │ │ A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is: │ │ • Wireless Mouse M335 │ • Zone Touch Mouse T400 │ • Wireless Mouse M545 │ • Wireless Mouse M560 │ • Touch Mouse M600 │ • Touch Mouse T620 │ • Wireless Rechargeable Touchpad T650 │ │ Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware. │ └─Unifying Receiver (RQR12) Device Update: New version: RQR12.08_B0030 Remote ID: lvfs Summary: Firmware for the Logitech Unifying Receiver (RQR12.xx) License: Proprietary Size: 72.7 kB Vendor: Logitech Duration: 30 seconds Flags: is-upgrade Description: This release addresses an encrypted keystroke injection issue known as Bastille security issue #13. The vulnerability is complex to replicate and would require a hacker to be physically close to a target. A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is: • Wireless Mouse M335 • Zone Touch Mouse T400 • Wireless Mouse M545 • Wireless Mouse M560 • Touch Mouse M600 • Touch Mouse T620 • Wireless Rechargeable Touchpad T650 Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware. B450M DS3H │ └─Unifying Receiver: │ Device ID: cf3685ba249d3d98602047341d6f5a5556a6ac05 │ Summary: A miniaturised USB wireless receiver │ Current version: RQR12.07_B0029 │ Bootloader Version: BOT01.02_B0014 │ Vendor: Logitech, Inc. (USB:0x046D) │ Install Duration: 30 seconds │ GUIDs: 9d131a0c-a606-580f-8eda-80587250b8d6 │ fcf55bf5-767b-51ce-9c17-f6f538c4ee9f │ 279ed287-3607-549e-bacc-f873bb9838c4 │ Device Flags: • Updatable │ • Supported on remote server │ ├─Unifying Receiver (RQR12) Device Update: │ New version: RQR12.10_B0032 │ Remote ID: lvfs │ Summary: Firmware for the Logitech Unifying Receiver (RQR12.xx) │ License: Proprietary │ Size: 56.8 kB │ Vendor: Logitech │ Duration: 30 seconds │ Flags: is-upgrade │ Description: This release addresses an encrypted keystroke injection vulnerability sent by pointing devices. The vulnerability is complex to replicate and would require a hacker to be physically close to a target. │ │ A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is: │ │ • Wireless Mouse M335 │ • Zone Touch Mouse T400 │ • Wireless Mouse M545 │ • Wireless Mouse M560 │ • Touch Mouse M600 │ • Touch Mouse T620 │ • Wireless Rechargeable Touchpad T650 │ │ Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware. │ └─Unifying Receiver (RQR12) Device Update: New version: RQR12.08_B0030 Remote ID: lvfs Summary: Firmware for the Logitech Unifying Receiver (RQR12.xx) License: Proprietary Size: 72.7 kB Vendor: Logitech Duration: 30 seconds Flags: is-upgrade Description: This release addresses an encrypted keystroke injection issue known as Bastille security issue #13. The vulnerability is complex to replicate and would require a hacker to be physically close to a target. A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is: • Wireless Mouse M335 • Zone Touch Mouse T400 • Wireless Mouse M545 • Wireless Mouse M560 • Touch Mouse M600 • Touch Mouse T620 • Wireless Rechargeable Touchpad T650 Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware. ProblemType: Bug DistroRelease: Ubuntu 20.04 Package: fwupd 1.3.5-1 Uname: Linux 5.4.5-050405-generic x86_64 NonfreeKernelModules: nvidia_modeset nvidia ApportVersion: 2.20.11-0ubuntu15 Architecture: amd64 Date: Fri Jan 10 08:32:23 2020 InstallationDate: Installed on 2019-05-07 (247 days ago) InstallationMedia: Ubuntu 18.04.2 LTS "Bionic Beaver" - Release amd64 (20190210) SourcePackage: fwupd UpgradeStatus: Upgraded to focal on 2019-11-15 (55 days ago) ** Affects: fwupd (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug focal -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1859180 Title: Uninformative, repetitive and extremely long MOTD message To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/fwupd/+bug/1859180/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
