Search the Community
Showing results for tags 'write'.
so, after some deliberation with Zer0Tolerance, we decided to release an updated version of the lv2 exploit that my friend released a long time ago. First, some notes: This exploit was patched on 4.40, NOT on 4.45 There isn't just ONE non checked pointer, there are FOUR! they are all 4 now checked in 4.40 /* * lv2 SysCall 670 (0x29E): sys_rsx_context_allocate * @param context_id (OUT): RSX context, E.g. 0x55555555 (in vsh.self) * @param lpar_dma_control (OUT): Control register area. E.g. 0x60100000 (in vsh.self) * @param lpar_driver_info (OUT): RSX data like frequencies