[Bug 1859180] Re: Uninformative, repetitive and extremely long MOTD message

Mario Limonciello superm1 at ubuntu.com
Mon Feb 3 22:12:53 UTC 2020


https://launchpad.net/ubuntu/+source/fwupd/1.3.7-2

** Changed in: fwupd (Ubuntu)
       Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to fwupd in Ubuntu.
https://bugs.launchpad.net/bugs/1859180

Title:
  Uninformative, repetitive and extremely long MOTD message

Status in fwupd package in Ubuntu:
  Fix Released

Bug description:
  I just SSH'd into my desktop, and was greeted with an additional _182_
  lines of MOTD output thanks to fwupd (this content is in
  /run/private/motd.d/85-fwupd, which is how I know fwupd is at fault).
  There are a few problems here:

  * The same content appears to be repeated 3 times
  * It has no indication of what this tree output is, you just have to guess that it's to do with firmware updates
  * The tree output itself is very wasteful of vertical space; it take 3 lines to give me the name of my device, and ~20 before I can work out that this is even describing updates
  * It has no call to action; I have no idea how I would apply these updates to my system

  I've included my full MOTD to demonstrate just how bad this looks:

  Welcome to Ubuntu Focal Fossa (development branch) (GNU/Linux
  5.4.5-050405-generic x86_64)

   * Documentation:  https://help.ubuntu.com
   * Management:     https://landscape.canonical.com
   * Support:        https://ubuntu.com/advantage

   * Overheard at KubeCon: "microk8s.status just blew my mind".

       https://microk8s.io/docs/commands#microk8s.status
  B450M DS3H
  │
  └─Unifying Receiver:
    │   Device ID:           cf3685ba249d3d98602047341d6f5a5556a6ac05
    │   Summary:             A miniaturised USB wireless receiver
    │   Current version:     RQR12.07_B0029
    │   Bootloader Version:  BOT01.02_B0014
    │   Vendor:              Logitech, Inc. (USB:0x046D)
    │   Install Duration:    30 seconds
    │   GUIDs:               9d131a0c-a606-580f-8eda-80587250b8d6
    │                        fcf55bf5-767b-51ce-9c17-f6f538c4ee9f
    │                        279ed287-3607-549e-bacc-f873bb9838c4
    │   Device Flags:        • Updatable
    │                        • Supported on remote server
    │ 
    ├─Unifying Receiver (RQR12) Device Update:
    │     New version:       RQR12.10_B0032
    │     Remote ID:         lvfs
    │     Summary:           Firmware for the Logitech Unifying Receiver (RQR12.xx)
    │     License:           Proprietary
    │     Size:              56.8 kB
    │     Vendor:            Logitech
    │     Duration:          30 seconds
    │     Flags:             is-upgrade
    │     Description:       This release addresses an encrypted keystroke injection vulnerability sent by pointing devices. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
    │     
    │     A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
    │     
    │      • Wireless Mouse M335
    │      • Zone Touch Mouse T400
    │      • Wireless Mouse M545
    │      • Wireless Mouse M560
    │      • Touch Mouse M600
    │      • Touch Mouse T620
    │      • Wireless Rechargeable Touchpad T650
    │     
    │     Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
    │   
    └─Unifying Receiver (RQR12) Device Update:
          New version:       RQR12.08_B0030
          Remote ID:         lvfs
          Summary:           Firmware for the Logitech Unifying Receiver (RQR12.xx)
          License:           Proprietary
          Size:              72.7 kB
          Vendor:            Logitech
          Duration:          30 seconds
          Flags:             is-upgrade
          Description:       This release addresses an encrypted keystroke injection issue known as Bastille security issue #13. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
          
          A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
          
           • Wireless Mouse M335
           • Zone Touch Mouse T400
           • Wireless Mouse M545
           • Wireless Mouse M560
           • Touch Mouse M600
           • Touch Mouse T620
           • Wireless Rechargeable Touchpad T650
          
          Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
        
  B450M DS3H
  │
  └─Unifying Receiver:
    │   Device ID:           cf3685ba249d3d98602047341d6f5a5556a6ac05
    │   Summary:             A miniaturised USB wireless receiver
    │   Current version:     RQR12.07_B0029
    │   Bootloader Version:  BOT01.02_B0014
    │   Vendor:              Logitech, Inc. (USB:0x046D)
    │   Install Duration:    30 seconds
    │   GUIDs:               9d131a0c-a606-580f-8eda-80587250b8d6
    │                        fcf55bf5-767b-51ce-9c17-f6f538c4ee9f
    │                        279ed287-3607-549e-bacc-f873bb9838c4
    │   Device Flags:        • Updatable
    │                        • Supported on remote server
    │ 
    ├─Unifying Receiver (RQR12) Device Update:
    │     New version:       RQR12.10_B0032
    │     Remote ID:         lvfs
    │     Summary:           Firmware for the Logitech Unifying Receiver (RQR12.xx)
    │     License:           Proprietary
    │     Size:              56.8 kB
    │     Vendor:            Logitech
    │     Duration:          30 seconds
    │     Flags:             is-upgrade
    │     Description:       This release addresses an encrypted keystroke injection vulnerability sent by pointing devices. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
    │     
    │     A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
    │     
    │      • Wireless Mouse M335
    │      • Zone Touch Mouse T400
    │      • Wireless Mouse M545
    │      • Wireless Mouse M560
    │      • Touch Mouse M600
    │      • Touch Mouse T620
    │      • Wireless Rechargeable Touchpad T650
    │     
    │     Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
    │   
    └─Unifying Receiver (RQR12) Device Update:
          New version:       RQR12.08_B0030
          Remote ID:         lvfs
          Summary:           Firmware for the Logitech Unifying Receiver (RQR12.xx)
          License:           Proprietary
          Size:              72.7 kB
          Vendor:            Logitech
          Duration:          30 seconds
          Flags:             is-upgrade
          Description:       This release addresses an encrypted keystroke injection issue known as Bastille security issue #13. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
          
          A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
          
           • Wireless Mouse M335
           • Zone Touch Mouse T400
           • Wireless Mouse M545
           • Wireless Mouse M560
           • Touch Mouse M600
           • Touch Mouse T620
           • Wireless Rechargeable Touchpad T650
          
          Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
        
  B450M DS3H
  │
  └─Unifying Receiver:
    │   Device ID:           cf3685ba249d3d98602047341d6f5a5556a6ac05
    │   Summary:             A miniaturised USB wireless receiver
    │   Current version:     RQR12.07_B0029
    │   Bootloader Version:  BOT01.02_B0014
    │   Vendor:              Logitech, Inc. (USB:0x046D)
    │   Install Duration:    30 seconds
    │   GUIDs:               9d131a0c-a606-580f-8eda-80587250b8d6
    │                        fcf55bf5-767b-51ce-9c17-f6f538c4ee9f
    │                        279ed287-3607-549e-bacc-f873bb9838c4
    │   Device Flags:        • Updatable
    │                        • Supported on remote server
    │ 
    ├─Unifying Receiver (RQR12) Device Update:
    │     New version:       RQR12.10_B0032
    │     Remote ID:         lvfs
    │     Summary:           Firmware for the Logitech Unifying Receiver (RQR12.xx)
    │     License:           Proprietary
    │     Size:              56.8 kB
    │     Vendor:            Logitech
    │     Duration:          30 seconds
    │     Flags:             is-upgrade
    │     Description:       This release addresses an encrypted keystroke injection vulnerability sent by pointing devices. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
    │     
    │     A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
    │     
    │      • Wireless Mouse M335
    │      • Zone Touch Mouse T400
    │      • Wireless Mouse M545
    │      • Wireless Mouse M560
    │      • Touch Mouse M600
    │      • Touch Mouse T620
    │      • Wireless Rechargeable Touchpad T650
    │     
    │     Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
    │   
    └─Unifying Receiver (RQR12) Device Update:
          New version:       RQR12.08_B0030
          Remote ID:         lvfs
          Summary:           Firmware for the Logitech Unifying Receiver (RQR12.xx)
          License:           Proprietary
          Size:              72.7 kB
          Vendor:            Logitech
          Duration:          30 seconds
          Flags:             is-upgrade
          Description:       This release addresses an encrypted keystroke injection issue known as Bastille security issue #13. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
          
          A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
          
           • Wireless Mouse M335
           • Zone Touch Mouse T400
           • Wireless Mouse M545
           • Wireless Mouse M560
           • Touch Mouse M600
           • Touch Mouse T620
           • Wireless Rechargeable Touchpad T650
          
          Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.

  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: fwupd 1.3.5-1
  Uname: Linux 5.4.5-050405-generic x86_64
  NonfreeKernelModules: nvidia_modeset nvidia
  ApportVersion: 2.20.11-0ubuntu15
  Architecture: amd64
  Date: Fri Jan 10 08:32:23 2020
  InstallationDate: Installed on 2019-05-07 (247 days ago)
  InstallationMedia: Ubuntu 18.04.2 LTS "Bionic Beaver" - Release amd64 (20190210)
  SourcePackage: fwupd
  UpgradeStatus: Upgraded to focal on 2019-11-15 (55 days ago)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/fwupd/+bug/1859180/+subscriptions



More information about the foundations-bugs mailing list