Join Us and become a Member for a Verified Badge to access private areas with the latest PS4 PKGs.

Is it too soon for a public PS5 Jailbreak?

  • Hell no, bring it on already!

    Votes: 1,200 54.5%
  • Yes, many can't get a PS5 yet!

    Votes: 1,002 45.5%

  • Total voters
    2,202
  • Poll closed .
Status
Not open for further replies.
Previously the PlayStation 5 Scene saw a PS5 WebKit Vulnerability alongside implementation of a PS5 Userland Exploit for 4.03 PS5 Firmware, which was followed by PS5 Debug Settings & Root Keys Obtained with scene developer @Mathieulh openly stating on Twitter that "Kernel execution has been achieved since week 1" around when the AMD Server Vulnerabilities were disclosed as @zezu420 (aka Znullptr) confirmed the pOOBs4 ExFAT Bug also affects PS5 while BTC Donations set up allowed the lead developer to get a PlayStation 5 console to fully implement the KeXploit on... exemplified by today's PS5 4.03 Kernel Build String image below from Znullptr (aka dmiller423) on Twitter! 🥳

:idea: Those who would like to support his continued development work may do so via BTC Donations, GoFundMe, becoming a Github Sponsor or Patreon. :lovewins:

:alert: Before collectors of PS5 Game Dumps in the PS5Scene get too excited, there's currently no ETA for a public PS5 Kernel Exploit release... but at least knowing it works on 4.03 and below may help those considering updating to Sony's current 4.50 PS5 Firmware make a wise decision not to update for the time being. ;)

:poll: Be sure to vote in our current Site Poll: Is it too soon for a public PS5 Jailbreak?

Finally, we'll keep the PlayStation 5 (PS5) Jailbreak Status page updated as things progress with some related articles (sorted by date, with the oldest first) and Tweets below:
Code:
r179926/releases/04.03 Oct 13 2021 08:48:08
PS5 4.03 Kernel Build String by Znullptr, No ETA for PS5 Kernel Exploit.jpg
 

Comments

Wonder if this new vulnerability helps the devs out: New Linux bug gives root on all major distros, exploit released

A new Linux vulnerability known as 'Dirty Pipe' allows local users to gain root privileges through publicly available exploits.

Today, security researcher Max Kellermann responsibly disclosed the 'Dirty Pipe' vulnerability and stated that it affects Linux Kernel 5.8 and later versions, even on Android devices.

The vulnerability is tracked as CVE-2022-0847 and allows a non-privileged user to inject and overwrite data in read-only files, including SUID processes that run as root.

 
Status
Not open for further replies.
Back
Top