[Bug 1859180] [NEW] Uninformative, repetitive and extremely long MOTD message

Dan Watkins daniel.watkins at canonical.com
Fri Jan 10 13:47:36 UTC 2020


Public bug reported:

I just SSH'd into my desktop, and was greeted with an additional _182_
lines of MOTD output thanks to fwupd (this content is in
/run/private/motd.d/85-fwupd, which is how I know fwupd is at fault).
There are a few problems here:

* The same content appears to be repeated 3 times
* It has no indication of what this tree output is, you just have to guess that it's to do with firmware updates
* The tree output itself is very wasteful of vertical space; it take 3 lines to give me the name of my device, and ~20 before I can work out that this is even describing updates
* It has no call to action; I have no idea how I would apply these updates to my system

I've included my full MOTD to demonstrate just how bad this looks:

Welcome to Ubuntu Focal Fossa (development branch) (GNU/Linux
5.4.5-050405-generic x86_64)

 * Documentation:  https://help.ubuntu.com
 * Management:     https://landscape.canonical.com
 * Support:        https://ubuntu.com/advantage

 * Overheard at KubeCon: "microk8s.status just blew my mind".

     https://microk8s.io/docs/commands#microk8s.status
B450M DS3H
│
└─Unifying Receiver:
  │   Device ID:           cf3685ba249d3d98602047341d6f5a5556a6ac05
  │   Summary:             A miniaturised USB wireless receiver
  │   Current version:     RQR12.07_B0029
  │   Bootloader Version:  BOT01.02_B0014
  │   Vendor:              Logitech, Inc. (USB:0x046D)
  │   Install Duration:    30 seconds
  │   GUIDs:               9d131a0c-a606-580f-8eda-80587250b8d6
  │                        fcf55bf5-767b-51ce-9c17-f6f538c4ee9f
  │                        279ed287-3607-549e-bacc-f873bb9838c4
  │   Device Flags:        • Updatable
  │                        • Supported on remote server
  │ 
  ├─Unifying Receiver (RQR12) Device Update:
  │     New version:       RQR12.10_B0032
  │     Remote ID:         lvfs
  │     Summary:           Firmware for the Logitech Unifying Receiver (RQR12.xx)
  │     License:           Proprietary
  │     Size:              56.8 kB
  │     Vendor:            Logitech
  │     Duration:          30 seconds
  │     Flags:             is-upgrade
  │     Description:       This release addresses an encrypted keystroke injection vulnerability sent by pointing devices. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
  │     
  │     A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
  │     
  │      • Wireless Mouse M335
  │      • Zone Touch Mouse T400
  │      • Wireless Mouse M545
  │      • Wireless Mouse M560
  │      • Touch Mouse M600
  │      • Touch Mouse T620
  │      • Wireless Rechargeable Touchpad T650
  │     
  │     Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
  │   
  └─Unifying Receiver (RQR12) Device Update:
        New version:       RQR12.08_B0030
        Remote ID:         lvfs
        Summary:           Firmware for the Logitech Unifying Receiver (RQR12.xx)
        License:           Proprietary
        Size:              72.7 kB
        Vendor:            Logitech
        Duration:          30 seconds
        Flags:             is-upgrade
        Description:       This release addresses an encrypted keystroke injection issue known as Bastille security issue #13. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
        
        A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
        
         • Wireless Mouse M335
         • Zone Touch Mouse T400
         • Wireless Mouse M545
         • Wireless Mouse M560
         • Touch Mouse M600
         • Touch Mouse T620
         • Wireless Rechargeable Touchpad T650
        
        Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
      
B450M DS3H
│
└─Unifying Receiver:
  │   Device ID:           cf3685ba249d3d98602047341d6f5a5556a6ac05
  │   Summary:             A miniaturised USB wireless receiver
  │   Current version:     RQR12.07_B0029
  │   Bootloader Version:  BOT01.02_B0014
  │   Vendor:              Logitech, Inc. (USB:0x046D)
  │   Install Duration:    30 seconds
  │   GUIDs:               9d131a0c-a606-580f-8eda-80587250b8d6
  │                        fcf55bf5-767b-51ce-9c17-f6f538c4ee9f
  │                        279ed287-3607-549e-bacc-f873bb9838c4
  │   Device Flags:        • Updatable
  │                        • Supported on remote server
  │ 
  ├─Unifying Receiver (RQR12) Device Update:
  │     New version:       RQR12.10_B0032
  │     Remote ID:         lvfs
  │     Summary:           Firmware for the Logitech Unifying Receiver (RQR12.xx)
  │     License:           Proprietary
  │     Size:              56.8 kB
  │     Vendor:            Logitech
  │     Duration:          30 seconds
  │     Flags:             is-upgrade
  │     Description:       This release addresses an encrypted keystroke injection vulnerability sent by pointing devices. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
  │     
  │     A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
  │     
  │      • Wireless Mouse M335
  │      • Zone Touch Mouse T400
  │      • Wireless Mouse M545
  │      • Wireless Mouse M560
  │      • Touch Mouse M600
  │      • Touch Mouse T620
  │      • Wireless Rechargeable Touchpad T650
  │     
  │     Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
  │   
  └─Unifying Receiver (RQR12) Device Update:
        New version:       RQR12.08_B0030
        Remote ID:         lvfs
        Summary:           Firmware for the Logitech Unifying Receiver (RQR12.xx)
        License:           Proprietary
        Size:              72.7 kB
        Vendor:            Logitech
        Duration:          30 seconds
        Flags:             is-upgrade
        Description:       This release addresses an encrypted keystroke injection issue known as Bastille security issue #13. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
        
        A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
        
         • Wireless Mouse M335
         • Zone Touch Mouse T400
         • Wireless Mouse M545
         • Wireless Mouse M560
         • Touch Mouse M600
         • Touch Mouse T620
         • Wireless Rechargeable Touchpad T650
        
        Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
      
B450M DS3H
│
└─Unifying Receiver:
  │   Device ID:           cf3685ba249d3d98602047341d6f5a5556a6ac05
  │   Summary:             A miniaturised USB wireless receiver
  │   Current version:     RQR12.07_B0029
  │   Bootloader Version:  BOT01.02_B0014
  │   Vendor:              Logitech, Inc. (USB:0x046D)
  │   Install Duration:    30 seconds
  │   GUIDs:               9d131a0c-a606-580f-8eda-80587250b8d6
  │                        fcf55bf5-767b-51ce-9c17-f6f538c4ee9f
  │                        279ed287-3607-549e-bacc-f873bb9838c4
  │   Device Flags:        • Updatable
  │                        • Supported on remote server
  │ 
  ├─Unifying Receiver (RQR12) Device Update:
  │     New version:       RQR12.10_B0032
  │     Remote ID:         lvfs
  │     Summary:           Firmware for the Logitech Unifying Receiver (RQR12.xx)
  │     License:           Proprietary
  │     Size:              56.8 kB
  │     Vendor:            Logitech
  │     Duration:          30 seconds
  │     Flags:             is-upgrade
  │     Description:       This release addresses an encrypted keystroke injection vulnerability sent by pointing devices. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
  │     
  │     A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
  │     
  │      • Wireless Mouse M335
  │      • Zone Touch Mouse T400
  │      • Wireless Mouse M545
  │      • Wireless Mouse M560
  │      • Touch Mouse M600
  │      • Touch Mouse T620
  │      • Wireless Rechargeable Touchpad T650
  │     
  │     Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
  │   
  └─Unifying Receiver (RQR12) Device Update:
        New version:       RQR12.08_B0030
        Remote ID:         lvfs
        Summary:           Firmware for the Logitech Unifying Receiver (RQR12.xx)
        License:           Proprietary
        Size:              72.7 kB
        Vendor:            Logitech
        Duration:          30 seconds
        Flags:             is-upgrade
        Description:       This release addresses an encrypted keystroke injection issue known as Bastille security issue #13. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
        
        A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
        
         • Wireless Mouse M335
         • Zone Touch Mouse T400
         • Wireless Mouse M545
         • Wireless Mouse M560
         • Touch Mouse M600
         • Touch Mouse T620
         • Wireless Rechargeable Touchpad T650
        
        Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.

ProblemType: Bug
DistroRelease: Ubuntu 20.04
Package: fwupd 1.3.5-1
Uname: Linux 5.4.5-050405-generic x86_64
NonfreeKernelModules: nvidia_modeset nvidia
ApportVersion: 2.20.11-0ubuntu15
Architecture: amd64
Date: Fri Jan 10 08:32:23 2020
InstallationDate: Installed on 2019-05-07 (247 days ago)
InstallationMedia: Ubuntu 18.04.2 LTS "Bionic Beaver" - Release amd64 (20190210)
SourcePackage: fwupd
UpgradeStatus: Upgraded to focal on 2019-11-15 (55 days ago)

** Affects: fwupd (Ubuntu)
     Importance: Undecided
         Status: New


** Tags: amd64 apport-bug focal

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to fwupd in Ubuntu.
https://bugs.launchpad.net/bugs/1859180

Title:
  Uninformative, repetitive and extremely long MOTD message

Status in fwupd package in Ubuntu:
  New

Bug description:
  I just SSH'd into my desktop, and was greeted with an additional _182_
  lines of MOTD output thanks to fwupd (this content is in
  /run/private/motd.d/85-fwupd, which is how I know fwupd is at fault).
  There are a few problems here:

  * The same content appears to be repeated 3 times
  * It has no indication of what this tree output is, you just have to guess that it's to do with firmware updates
  * The tree output itself is very wasteful of vertical space; it take 3 lines to give me the name of my device, and ~20 before I can work out that this is even describing updates
  * It has no call to action; I have no idea how I would apply these updates to my system

  I've included my full MOTD to demonstrate just how bad this looks:

  Welcome to Ubuntu Focal Fossa (development branch) (GNU/Linux
  5.4.5-050405-generic x86_64)

   * Documentation:  https://help.ubuntu.com
   * Management:     https://landscape.canonical.com
   * Support:        https://ubuntu.com/advantage

   * Overheard at KubeCon: "microk8s.status just blew my mind".

       https://microk8s.io/docs/commands#microk8s.status
  B450M DS3H
  │
  └─Unifying Receiver:
    │   Device ID:           cf3685ba249d3d98602047341d6f5a5556a6ac05
    │   Summary:             A miniaturised USB wireless receiver
    │   Current version:     RQR12.07_B0029
    │   Bootloader Version:  BOT01.02_B0014
    │   Vendor:              Logitech, Inc. (USB:0x046D)
    │   Install Duration:    30 seconds
    │   GUIDs:               9d131a0c-a606-580f-8eda-80587250b8d6
    │                        fcf55bf5-767b-51ce-9c17-f6f538c4ee9f
    │                        279ed287-3607-549e-bacc-f873bb9838c4
    │   Device Flags:        • Updatable
    │                        • Supported on remote server
    │ 
    ├─Unifying Receiver (RQR12) Device Update:
    │     New version:       RQR12.10_B0032
    │     Remote ID:         lvfs
    │     Summary:           Firmware for the Logitech Unifying Receiver (RQR12.xx)
    │     License:           Proprietary
    │     Size:              56.8 kB
    │     Vendor:            Logitech
    │     Duration:          30 seconds
    │     Flags:             is-upgrade
    │     Description:       This release addresses an encrypted keystroke injection vulnerability sent by pointing devices. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
    │     
    │     A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
    │     
    │      • Wireless Mouse M335
    │      • Zone Touch Mouse T400
    │      • Wireless Mouse M545
    │      • Wireless Mouse M560
    │      • Touch Mouse M600
    │      • Touch Mouse T620
    │      • Wireless Rechargeable Touchpad T650
    │     
    │     Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
    │   
    └─Unifying Receiver (RQR12) Device Update:
          New version:       RQR12.08_B0030
          Remote ID:         lvfs
          Summary:           Firmware for the Logitech Unifying Receiver (RQR12.xx)
          License:           Proprietary
          Size:              72.7 kB
          Vendor:            Logitech
          Duration:          30 seconds
          Flags:             is-upgrade
          Description:       This release addresses an encrypted keystroke injection issue known as Bastille security issue #13. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
          
          A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
          
           • Wireless Mouse M335
           • Zone Touch Mouse T400
           • Wireless Mouse M545
           • Wireless Mouse M560
           • Touch Mouse M600
           • Touch Mouse T620
           • Wireless Rechargeable Touchpad T650
          
          Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
        
  B450M DS3H
  │
  └─Unifying Receiver:
    │   Device ID:           cf3685ba249d3d98602047341d6f5a5556a6ac05
    │   Summary:             A miniaturised USB wireless receiver
    │   Current version:     RQR12.07_B0029
    │   Bootloader Version:  BOT01.02_B0014
    │   Vendor:              Logitech, Inc. (USB:0x046D)
    │   Install Duration:    30 seconds
    │   GUIDs:               9d131a0c-a606-580f-8eda-80587250b8d6
    │                        fcf55bf5-767b-51ce-9c17-f6f538c4ee9f
    │                        279ed287-3607-549e-bacc-f873bb9838c4
    │   Device Flags:        • Updatable
    │                        • Supported on remote server
    │ 
    ├─Unifying Receiver (RQR12) Device Update:
    │     New version:       RQR12.10_B0032
    │     Remote ID:         lvfs
    │     Summary:           Firmware for the Logitech Unifying Receiver (RQR12.xx)
    │     License:           Proprietary
    │     Size:              56.8 kB
    │     Vendor:            Logitech
    │     Duration:          30 seconds
    │     Flags:             is-upgrade
    │     Description:       This release addresses an encrypted keystroke injection vulnerability sent by pointing devices. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
    │     
    │     A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
    │     
    │      • Wireless Mouse M335
    │      • Zone Touch Mouse T400
    │      • Wireless Mouse M545
    │      • Wireless Mouse M560
    │      • Touch Mouse M600
    │      • Touch Mouse T620
    │      • Wireless Rechargeable Touchpad T650
    │     
    │     Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
    │   
    └─Unifying Receiver (RQR12) Device Update:
          New version:       RQR12.08_B0030
          Remote ID:         lvfs
          Summary:           Firmware for the Logitech Unifying Receiver (RQR12.xx)
          License:           Proprietary
          Size:              72.7 kB
          Vendor:            Logitech
          Duration:          30 seconds
          Flags:             is-upgrade
          Description:       This release addresses an encrypted keystroke injection issue known as Bastille security issue #13. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
          
          A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
          
           • Wireless Mouse M335
           • Zone Touch Mouse T400
           • Wireless Mouse M545
           • Wireless Mouse M560
           • Touch Mouse M600
           • Touch Mouse T620
           • Wireless Rechargeable Touchpad T650
          
          Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
        
  B450M DS3H
  │
  └─Unifying Receiver:
    │   Device ID:           cf3685ba249d3d98602047341d6f5a5556a6ac05
    │   Summary:             A miniaturised USB wireless receiver
    │   Current version:     RQR12.07_B0029
    │   Bootloader Version:  BOT01.02_B0014
    │   Vendor:              Logitech, Inc. (USB:0x046D)
    │   Install Duration:    30 seconds
    │   GUIDs:               9d131a0c-a606-580f-8eda-80587250b8d6
    │                        fcf55bf5-767b-51ce-9c17-f6f538c4ee9f
    │                        279ed287-3607-549e-bacc-f873bb9838c4
    │   Device Flags:        • Updatable
    │                        • Supported on remote server
    │ 
    ├─Unifying Receiver (RQR12) Device Update:
    │     New version:       RQR12.10_B0032
    │     Remote ID:         lvfs
    │     Summary:           Firmware for the Logitech Unifying Receiver (RQR12.xx)
    │     License:           Proprietary
    │     Size:              56.8 kB
    │     Vendor:            Logitech
    │     Duration:          30 seconds
    │     Flags:             is-upgrade
    │     Description:       This release addresses an encrypted keystroke injection vulnerability sent by pointing devices. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
    │     
    │     A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
    │     
    │      • Wireless Mouse M335
    │      • Zone Touch Mouse T400
    │      • Wireless Mouse M545
    │      • Wireless Mouse M560
    │      • Touch Mouse M600
    │      • Touch Mouse T620
    │      • Wireless Rechargeable Touchpad T650
    │     
    │     Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
    │   
    └─Unifying Receiver (RQR12) Device Update:
          New version:       RQR12.08_B0030
          Remote ID:         lvfs
          Summary:           Firmware for the Logitech Unifying Receiver (RQR12.xx)
          License:           Proprietary
          Size:              72.7 kB
          Vendor:            Logitech
          Duration:          30 seconds
          Flags:             is-upgrade
          Description:       This release addresses an encrypted keystroke injection issue known as Bastille security issue #13. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
          
          A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
          
           • Wireless Mouse M335
           • Zone Touch Mouse T400
           • Wireless Mouse M545
           • Wireless Mouse M560
           • Touch Mouse M600
           • Touch Mouse T620
           • Wireless Rechargeable Touchpad T650
          
          Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.

  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: fwupd 1.3.5-1
  Uname: Linux 5.4.5-050405-generic x86_64
  NonfreeKernelModules: nvidia_modeset nvidia
  ApportVersion: 2.20.11-0ubuntu15
  Architecture: amd64
  Date: Fri Jan 10 08:32:23 2020
  InstallationDate: Installed on 2019-05-07 (247 days ago)
  InstallationMedia: Ubuntu 18.04.2 LTS "Bionic Beaver" - Release amd64 (20190210)
  SourcePackage: fwupd
  UpgradeStatus: Upgraded to focal on 2019-11-15 (55 days ago)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/fwupd/+bug/1859180/+subscriptions



More information about the foundations-bugs mailing list