confirmation that the PS4 4.01 Ksploit has been reported to Sony and likely to be patched, PlayStation 4 developers have been researching the Chaitin Tech 4.01 PS4 jailbreak exploit's entry point in hopes to bring Linux to Firmware 3.50 through 4.01 among other scene advancements.
@Jeff and @B7U3 C50SS started a collaborative research post HERE, and since then @SpecterDev shared his thoughts thus far on his latest PS4 Development Blog article.
Check it out linked above, and to quote in part: "CVE-2016-1885 is not applicable to the PS4, Sony removed set_ldt after 1.76. Thanks to Red-EyeX32 for pointing this out."
PlayStation 4 developer @theorywrong tweeted the following SVN Commit r307941 via his Twitter which according to @Akaike may be the email with the Chaitin exploit and how to fix it while @mcmrc1 posted HERE he might have stumbled upon the GIT.
According to @Akaike in the Shoutbox the Chaitin Tech Lab exploit was intended to execute code via PS4 kernel mode in conjunction with fail0verflow Linux.
@SpecterDev also noted in the Shoutbox that SAMU handles PlayStation 4 encryption, saves, games, modules, firmware, etc and that the problem with SAMU is although it can be used with kernel access to decrypt files, the keys are locked in SAMU and thus far can't be extracted... meaning external decryption can't be done.
Keep in mind folks the topic of this article / thread is to research the Chaitin Tech 4.01 PS4 jailbreak exploit's entry point, so much of what's theorized here may change or be corrected at any time.
Thanks to @toni1988 and everyone else I 'mentioned' above along with several others I may have overlooked in the PSXHAX Shoutbox, and don't forget we have a dedicated Discord Server for PlayStation 4 development and other live discussions headed up by @VultraAID and @Lucii!