Tag Archives: Firmware

Latest PS5 Firmware Update Available Now, Prepares for DualSense Edge Launch

The time has come once again: Sony has just released the latest firmware update for PS5. Fire up your console and you’ll find it’s ready to download and install (you’ll also need to sign in after agreeing to the updated terms of service). At just over 1GB in size, it’s not going to take you too long to sort out.

This time, the new system software — version 22.02-06.50.00, if you’re wondering — has not one but two patch notes. Here they are:

  • The DualSense Edge wireless controller is now supported.
  • This system software update improves system performance.

So, it’s pretty much business as usual for firmware updates, only this one also prepares your console for the arrival of the DualSense Edge. To recap, this is a premium PS5 controller arriving on the 26th January, offering greater flexibility with customisable thumb sticks, triggers, control profiles, and back-facing buttons. As long as you update your PS5 to this new firmware, the Edge controller will be good to go.

Are you pumped up about this latest PS5 firmware update? Live life on the edge in the comments section below.



Read original article here

Nintendo Releases Update For Switch (Version 15.0.1), Here Are The Details

Image: Nintendo

At the beginning of November, Nintendo released a system update for the Switch, bumping it up to Version 15.0.1.

As revealed by dataminer OatmealDome at the time, it included a handful of fixes. As usual, there were also some “general system stability improvements” to enhance the overall user experience.

Today’s update is slightly different, as it’s a “rebootless” one for the existing firmware update (Version 15.0.1). As explained by the same source, these updates do not require the console to be restarted or the user to do anything on their end.

This latest update for Version 15.0.1 makes changes to the “bad words” list. Here’s the full rundown courtesy of OatmealDome:

[Nintendo Switch Firmware Update] – A rebootless update for 15.0.1 was released.

“The sole changes are to the bad words lists. Various terms were added. It also appears the lists were shuffled a bit to prevent inoffensive text from being accidentally blocked in some languages.”

This is the first rebootless update since Version 14.1.2 in July. You can get the full rundown about the most recent Switch firmware update in our previous coverage:



Read original article here

Intel says that both Intel and AMD CPUs can update Arc GPU firmware [Updated]

Enlarge / An Intel Arc GPU.

Intel

Update, 7:35 pm ET: Intel told Ars Technica that it is possible for both Intel and AMD-based platforms to update Arc GPU firmware, and that Intel’s Management Engine wasn’t actually required for firmware updates.

“Intel Arc products do not require the host CSME to update Arc firmware,” an Intel spokesperson told Ars. “Firmware updates will work on both AMD and Intel platforms. Arc products have their own Graphics Security Control for firmware updates and leverage existing Intel technology like the HECI interface protocol to implement the firmware update flow.”

A follow-up from Richard Hughes, the developer who originally discovered the limitation, said that another user had told him that an “HECI-using GSC device shows up in Windows” when an Arc GPU is installed, which ought to allow updates on x86 devices. We confirmed this ourselves on a Windows PC with an Arc GPU installed and saw Intel’s GSC firmware interface listed in the device manager, which ought to work the same way on both Intel and AMD platforms since it’s a part of the GPU itself. (How and whether it will work in x86 Linux is something we can’t confirm at this point.)

Enlarge / The GSC interface that Intel indicates will allow firmware updates, at least on x86 Windows PCs.

Non-x86 platforms, including those based on Arm CPUs and IBM’s Power architecture, still may not be able to update Arc GPU firmware. But the vast majority of consumer-oriented gaming GPUs won’t end up in these systems, making this firmware update issue something that almost no one will actually be affected by.

Original story: In our review of Intel’s Arc GPUs, we were generally impressed by their performance for the price, especially as a first-generation product. But buyers have plenty of potential caveats to consider, including unstable drivers, inconsistent performance, and a couple of weird problems that you need to dig around in your computer’s BIOS settings to resolve.

Linux developers working on Arc support appear to have uncovered another oddity about the cards. According to developer Richard Hughes (as reported by Phoronix), updating the firmware on Arc GPUs appears to be handled by the Intel Management Engine, a small microcontroller that is only included in PCs with Intel processors. Hughes ran into the problem specifically in the context of IBM’s POWER CPU architecture, but it seems to make firmware updates impossible on any non-Intel platform, including those based on AMD or Arm CPUs.

Luckily, these kinds of GPU firmware updates don’t happen all that often, and when they do happen, it’s usually to fix a specific obscure problem or add minor features—using a GPU with outdated firmware isn’t the end of the world. On the other hand, if ever a GPU was going to need important firmware updates somewhere down the line, it would be this first generation of Arc cards, which are Intel’s first widely released dedicated GPUs and have already proven to be exceptionally rough around the edges in a bunch of other ways.

We’ve contacted Intel to ask whether it plans to change how Arc firmware updates are installed, and we’ll update this article if we receive a response.



Read original article here

Nintendo Switch System Update 15.0.1 Is Now Live, Here Are The Full Patch Notes

Image: Nintendo

Nintendo has just released another new firmware update for the Switch – bumping the system up to Version 15.0.1.

This one resolves a few issues including one problem causing an error code when playing DLC on a unit that’s not your primary console. It also fixes an issue preventing screenshots during certain in-game scenes on select games. And as usual, it comes with general system stability improvements.

Here’s what’s included via Nintendo’s official support page:

Ver. 15.0.1 (Released October 31, 2022)

– Resolved an issue causing Error Code: 2181-1000 to appear when playing DLC from a console other than your primary console.

– Resolved an issue preventing screenshots during specific in-game scenes for some games.

– General system stability improvements to enhance the user’s experience.

Nintendo Dataminer OatmealDome has taken a closer look at this latest update and it appears the “bad words list” has been updated:

This update follows Version 15.0.0, which was released earlier this month:



Read original article here

You can now download Android 13 firmware for your Galaxy S22 from SamMobile!

Earlier today, Samsung released the stable Android 13 (One UI 5.0) update to the Galaxy S22 series in various European countries. If your country hasn’t received the One UI 5.0 update yet, you can download the new firmware and flash it manually on your Galaxy S22 series smartphone.

The stable Android 13-based One UI 5.0 firmware for the Galaxy S22, Galaxy S22+, and the Galaxy S22 Ultra are now available in our database. The new update comes with firmware version S90xBXXU2BVJA, and the firmware files can be downloaded from our firmware database.

The update is now available in these countries: Austria, Croatia, France, Ireland, Italy, Poland, Portugal, Serbia, Slovenia, Switzerland, the Czech Republic, and the UK. Other countries and markets could get the update within the next few days.

If the OTA update is available on your Galaxy S22 series smartphone, you can download it by navigating to Settings » Software update and tapping Download and install. Alternatively, you can download the new firmware file from our firmware database and flash it manually. Don’t forget to back up your data before flashing the new firmware.

The new update still comes with the October 2022 security update. It brings a slightly refreshed UI design, featuring the expanded Color Palette feature, easier and more comprehensive lock screen customization, improved widgets, and stacked widgets. Samsung has also improved all of its stock apps.

SamsungGalaxy S22

SamsungGalaxy S22+

SamsungGalaxy S22 Ultra

Read original article here

Nintendo Switch System Update 15.0.0 Is Now Live, Here Are The Full Patch Notes

Download it today

Image: Nintendo

Nintendo has just released another new firmware update for the Switch. It bumps the system up to version 15.0.0.

According to the company’s official support page, this latest update includes makes some minor adjustments, allows screenshots to be taken in the NSO application and also comes with some general stability improvements.

Version 15.0.0 (Released October 10, 2022

– The location of Bluetooth Audion menu within System Settings has moved.

– Screenshots can be taken using the Capture Button while in the Nintendo Switch Online application found on the Nintendo Switch HOME Menu. (Note: Video capture is not supported)

– General system stability improvements to enhance the user’s experience


Have you downloaded this update yet? Notice anything else in this firmware update? Leave a comment down below.

[source en-americas-support.nintendo.com]



Read original article here

Released! PS5 Kernel exploit + Webkit vulnerability for Firmware 4.03

Oh, wow, only a few hours after tweeting that this needed to be “ironed out”, SpecterDev has now published his implementation of the PS5 IPV6 Kernel exploit!

This release relies on the Webkit vulnerability as an entry point, meaning it will work on any PS5 (including PS5 Digital edition) running firmware 4.03. Lower firmwares might work (although the exploit might need tweaking). Higher firmwares will not work at the moment (they are not vulnerable to the Webkit exploit)

PS5 4.03 Kernel exploit is here!

SpecterDev warns about significant limitations of this exploit. Notably:

  1. The exploit is fairly unstable, and in his experience will work about 30% of the time. If you are trying to run it, don’t give up, it might require several attempts before the exploit gets through
  2. Possibly more important, this exploit gives us read/write access, but no execute! This means no possibility to load and run binaries at the moment, everything is constrained within the scope of the ROP chain. The current implementation does however enable debug settings.

More precisely, from the exploit’s readme:

Currently Included

  • Obtains arbitrary read/write and can run a basic RPC server for reads/writes (or a dump server for large reads) (must edit your own address/port into the exploit file on lines 673-677)
  • Enables debug settings menu (note: you will have to fully exit settings and go back in to see it).
  • Gets root privileges

Limitations

  • This exploit achieves read/write, but not code execution. This is because we cannot currently dump kernel code for gadgets, as kernel .text pages are marked as eXecute Only Memory (XOM). Attempting to read kernel .text pointers will panic!
  • As per the above + the hypervisor (HV) enforcing kernel write protection, this exploit also cannot install any patches or hooks into kernel space, which means no homebrew-related code for the time being.
  • Clang-based fine-grained Control Flow Integrity (CFI) is present and enforced.
  • Supervisor Mode Access Prevention/Execution (SMAP/SMEP) cannot be disabled, due to the HV.
  • The write primitive is somewhat constrained, as bytes 0x10-0x14 must be zero (or a valid network interface).
  • The exploit’s stability is currently poor. More on this below.
  • On successful run, exit the browser with circle button, PS button panics for a currently unknown reason.

Stability Notes

Stability for this exploit is at about 30%, and has multiple potential points of failure. In order of observed descending liklihood:

  1. Stage 1 causes more than one UAF due to failing to catch one or more in the reclaim, causing latent corruption that causes a panic some time later on.
  2. Stage 4 finds the overlap/victim socket, but the pktopts is the same as the master socket’s, causing the “read” primitive to just read back the pointer you attempt to read instead of that pointer’s contents. This needs some improvement and to be fixed if possible because it’s really annoying.
  3. Stage 1‘s attempt to reclaim the UAF fails and something else steals the pointer, causing immediate panic.
  4. The kqueue leak fails and it fails to find a recognized kernel .data pointer.

In other words, this release is useful for hackers only, or people who are curious to dig into the inside of the PS5. Note however that despite its limitations, this is the first ever public release of such a powerful hack for the PS5, which means fresh discoveries are bound to happen!

PS5 IPV6 Exploit showcase video

Scene member Echo Stretch managed to run the exploit and get us a video of it in action, as can be seen below. In the video, you can see Debug menu and package installer being unlocked on the PS5

 

Download and run

You can download the hack here.

You will need Python to run SpecterDev’s implementation, and you will be running a webserver on your local PC for your PS5 to access.

  1. Configure fakedns via dns.conf to point manuals.playstation.net to your PCs IP address
  2. Run fake dns: python fakedns.py -c dns.conf
  3. Run HTTPS server: python host.py
  4. Go into PS5 advanced network settings and set primary DNS to your PCs IP address and leave secondary at 0.0.0.0
    1. Sometimes the manual still won’t load and a restart is needed, unsure why it’s really weird
  5. Go to user manual in settings and accept untrusted certificate prompt, run
  6. Optional: Run rpc/dump server scripts (note: address/port must be substituted in binary form into exploit.js)

This is a developing story, as more people will test and report on this hack in the days to come, so stay tuned!

Source: SpecterDev



Read original article here

Debian Choose A Reasonable, Common Sense Solution To Dealing With Non-Free Firmware

Debian developers have been figuring out an updated stance to take on non-free firmware considering the increasing number of devices now having open-source Linux drivers but requiring closed-source firmware for any level of functionality. The voting on the non-free firmware matter has now concluded and the votes tallied…

The debian votes option 5 as winning: “Change SC for non-free firmware in installer, one installer

Per the Debian Wiki, that option amounts to:

The Debian Social Contract is replaced with a new version that is identical to the current version in all respects except that it adds the following sentence to the end of point 5:

“The Debian official media may include firmware that is otherwise not part of the Debian system to enable use of Debian with hardware that requires such firmware.”

The Debian Project also makes the following statement on an issue of the day:

We will include non-free firmware packages from the “non-free-firmware” section of the Debian archive on our official media (installer images and live images). The included firmware binaries will normally be enabled by default where the system determines that they are required, but where possible we will include ways for users to disable this at boot (boot menu option, kernel command line etc.).

When the installer/live system is running we will provide information to the user about what firmware has been loaded (both free and non-free), and we will also store that information on the target system such that users will be able to find it later. Where non-free firmware is found to be necessary, the target system will also be configured to use the non-free-firmware component by default in the apt sources.list file. Our users should receive security updates and important fixes to firmware binaries just like any other installed software.

We will publish these images as official Debian media, replacing the current media sets that do not include non-free firmware packages.

Basically the Debian Installer media will now be allowed to include non-free firmware and to automatically load/use it where necessary while informing the user of it, etc. Considering the state of the hardware ecosystem these days, it’s reasonable and common sense since at least users will be able to easily make use of their graphics cards, network adapters, and more. Plus a number of modern CPU security mitigations also requiring the updated closed-source microcode. So all in, I am personally happy with this decision as it will allow for a more pleasant experience for Debian on modern systems and one akin to what is found with other Linux distributions.

Read original article here

3DS System Update 11.16.0-49 Is Now Live, Here Are The Full Patch Notes

Image: Nintendo

Following the 3DS system update late last month, Nintendo has now issued another one. This bumps the system up to Version 11.16.0-49. Here are the full patch notes, courtesy of Nintendo’s support website:

Ver. 11.16.0-49U (September 12th, 2022)

“Further improvements to overall system stability and other minor adjustments have been made to enhance the user experience.”

Dataminer OatmealDome has shed some light on this latest system update (via @snbeast6). Apparently, it’s been issued because there was a “missing digit” in the Nintendo support phone number.

“Version 11.16.0-49 was released, a minor revision to the previous firmware. The sole change is to fix a typo (missing digit in the Nintendo support phone number) in text added in the last update. Homebrew is unaffected and it is safe to update.”

The previous update (Version 11.16.0-48) was also a stability update but included some updates to the 3DS eShop, web browser, and a few other areas.

Have you downloaded this latest update yet? Notice anything else? Comment down below.



Read original article here

3DS System Update 11.16.0-48 Is Now Live, Here Are The Full Patch Notes

Another stability update has been delivered

Image: Nintendo

Well, just like the Wii U – the Nintendo 3DS has also received a system firmware update today. This bumps the unit up to 11.16.0-48. It’s once again another “stability” update. There have also been some other minor adjustments.

Like the Wii U update, this also happens to be the first patch for the 3DS in 2022. Here are the official patch notes, courtesy of Nintendo’s support page:

Ver. 11.16.0-48U (August 29th, 2022)

  • Further improvements to overall system stability and other minor adjustments have been made to enhance the user experience.

Once again, this lines up with the latest phase of the 3DS eShop shutdown, which removes the use of prepaid cards.

Have you downloaded this update yet? Notice anything else? Leave a comment below.

[source en-americas-support.nintendo.com]



Read original article here

The Ultimate News Site