Changes

Jump to navigation Jump to search
36 bytes added ,  11:00, 7 February 2017
no edit summary
Line 242: Line 242:  
The fix for firmlaunch-hax was only applied to NATIVE_FIRM in [[9.5.0-22|9.5.0-X]], leaving SAFE_FIRM exploitable. With ARM11-kernel execution, one can trigger FIRM-launch in to SAFE_FIRM, do Kernel9 <=> Kernel11 sync, PXI sync and then repeat the original attack on SAFE_FIRM instead.
 
The fix for firmlaunch-hax was only applied to NATIVE_FIRM in [[9.5.0-22|9.5.0-X]], leaving SAFE_FIRM exploitable. With ARM11-kernel execution, one can trigger FIRM-launch in to SAFE_FIRM, do Kernel9 <=> Kernel11 sync, PXI sync and then repeat the original attack on SAFE_FIRM instead.
 
| ARM9 code execution
 
| ARM9 code execution
| None
+
| [[11.3.0-36|11.3.0-X]]
 
|  
 
|  
 
| 2012-2013?
 
| 2012-2013?
Line 473: Line 473:  
| When a KTimer is created in pulse mode, the kernel calls a virtual function to reset the timer each time it pulses. The scheduler is locked for that core to avoid race conditions, but another core can call CloseHandle on the timer and free it, leading to a UAF vtable call.
 
| When a KTimer is created in pulse mode, the kernel calls a virtual function to reset the timer each time it pulses. The scheduler is locked for that core to avoid race conditions, but another core can call CloseHandle on the timer and free it, leading to a UAF vtable call.
 
| See description.
 
| See description.
| None
+
| [[11.3.0-36|11.3.0-X]]
 
| [[11.2.0-35|11.2.0-X]]
 
| [[11.2.0-35|11.2.0-X]]
 
| May 2016
 
| May 2016
2

edits

Navigation menu