Editing Vulnerabilities

Jump to navigation Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 997: Line 997:


== Kernel ==
== Kernel ==
=== FW <= 11.52 - Double free in bnet_netevent_set_queue ===
==== Credits ====
* Anonymous for sharing 11.52 and 12.00 PS4 kernel dumps.
* 2024-09-27 D-Link Turtle for diffing 11.52 and 12.00 PS4 kernel dumps.
* 2024-10-04 SlidyBat for figuring out the bug in bnet and its impact.
==== Analysis ====
* [https://x.com/iMrDJAi/status/1842306232125964473/photo/1 Analysis by abc (2024-10-04)]
==== Bug Description ====
A double free can happen by racing calls to bnet_netevent_set_queue and bnet_netevent_unset_queue.
The lack of mutexes allowed double free as fdrop is called unconditionally in bnet_netevent_unset_queue.
See also PS Vita SceNetPs kernel module that uses similar bnet functions.
==== Exploit Implementation ====
==== Patched ====
'''Yes''' in 12.00 FW. Maybe not working at all on PS5.
The bug was patched in PS4 FW 12.00 by adding some mutexes in bnet_netevent functions
----


=== FW <= 11.00 - Remote vulnerabilities in spp (yielding kernel ASLR defeat) (CVE-2006-4304 and no-CVE) ===
=== FW <= 11.00 - Remote vulnerabilities in spp (yielding kernel ASLR defeat) (CVE-2006-4304 and no-CVE) ===
Please note that all contributions to PS4 Developer wiki are considered to be released under the GNU Free Documentation License 1.2 (see PS4 Developer wiki:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following hCaptcha:

Cancel Editing help (opens in new window)