MyMiniFactory - glutorange

Firmware-Update unter Linux

Auch wenn es schon lange verfügbar ist, habe ich heute zum ersten mal den fwupdmgr unter Linux benutzt um eine Geräte-Firmware zu aktualisieren. Wenn es doch immer so einfach wäre…

dneubert@ryzen:~$ sudo fwupdmgr get-upgrades
• Samsung SSD 970 EVO 1TB has no available firmware updates
• Samsung SSD 970 EVO 1TB has no available firmware updates
X570 AORUS PRO
│
└─Unifying Receiver:
  │   Device ID:           5bb8be566f7b007e87240de3ad212f80349dda9c
  │   Summary:             A miniaturised USB wireless receiver
  │   Current version:     RQR12.01_B0019
  │   Bootloader Version:  BOT01.02_B0014
  │   Vendor:              USB:0x046D
  │   Install Duration:    30 seconds
  │   GUIDs:               9d131a0c-a606-580f-8eda-80587250b8d6
  │                        fcf55bf5-767b-51ce-9c17-f6f538c4ee9f ← HIDRAW\VEN_046D&DEV_C52B&REV_00
  │                        279ed287-3607-549e-bacc-f873bb9838c4 ← HIDRAW\VEN_046D&DEV_C52B
  │   Device Flags:        • Updatable
  │                        • Supported on remote server
  │ 
  ├─Unifying Receiver (RQR12) Device Update:
  │     New version:       RQR12.10_B0032
  │     Remote ID:         lvfs
  │     Summary:           Firmware for the Logitech Unifying Receiver (RQR12.xx)
  │     License:           Proprietary
  │     Size:              56,8 kB
  │     Vendor:            Logitech
  │     Duration:          30 seconds
  │     Flags:             is-upgrade
  │     Description:       This release addresses an encrypted keystroke injection vulnerability sent by pointing devices. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
  │     
  │     A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
  │     
  │      • Wireless Mouse M335
  │      • Zone Touch Mouse T400
  │      • Wireless Mouse M545
  │      • Wireless Mouse M560
  │      • Touch Mouse M600
  │      • Touch Mouse T620
  │      • Wireless Rechargeable Touchpad T650
  │     
  │     Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
  │   
  ├─Unifying Receiver (RQR12) Device Update:
  │     New version:       RQR12.08_B0030
  │     Remote ID:         lvfs
  │     Summary:           Firmware for the Logitech Unifying Receiver (RQR12.xx)
  │     License:           Proprietary
  │     Size:              72,7 kB
  │     Vendor:            Logitech
  │     Duration:          30 seconds
  │     Flags:             is-upgrade
  │     Description:       This release addresses an encrypted keystroke injection issue known as Bastille security issue #13. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
  │     
  │     A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
  │     
  │      • Wireless Mouse M335
  │      • Zone Touch Mouse T400
  │      • Wireless Mouse M545
  │      • Wireless Mouse M560
  │      • Touch Mouse M600
  │      • Touch Mouse T620
  │      • Wireless Rechargeable Touchpad T650
  │     
  │     Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
  │   
  └─Unifying Receiver (RQR12) Device Update:
        New version:       RQR12.07_B0029
        Remote ID:         lvfs
        Summary:           Firmware for the Logitech Unifying Receiver (RQR12.xx)
        License:           Proprietary
        Size:              69,6 kB
        Vendor:            Logitech
        Duration:          30 seconds
        Flags:             is-upgrade
        Description:       This release addresses an unencrypted keystroke injection issue known as Bastille security issue #11. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.

Hier wird uns verraten, dass es ein Firmware-Update für den Logitech Unifying Receiver gibt, also fix das Update angestoßen:

dneubert@ryzen:~$ sudo fwupdmgr update 5bb8be566f7b007e87240de3ad212f80349dda9c
Unifying Receiver and all connected devices may not be usable while updating. Continue with update? [Y|n]: 
Downloading RQR12.10_B0032 for Unifying Receiver...
Fetching firmware https://fwupd.org/downloads/8d83954fcf79453738dbeba9615a095bae9caed9-Logitech-Unifying-RQR12.10_B0032.cab
Downloading…             [***************************************] Less than one minute remaining…
Decompressing…           [***************************************]
Authenticating…          [***************************************]
Updating Unifying Receiver…
Idle…                    [***************************************]
Updating Unifying Receiver…**************************************]
Writing…                 [***************************************]
Successfully installed firmware
dneubert@ryzen:~$ 

Nach knapp 15 Sekunden ist alles erledigt. Während des Updates ist die Maus – wie im Hinweistext beschrieben – nicht nutzbar 😉

Weitere Informationen liefern folgende Links:

Beitrag erstellt am 04.02.2021 um 01:07:49 Uhr von Daniel in Kategorie(n): Allgemein, IT, Linux

|

[Impressum]