A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges. The vulnerability is caused due to an error within the driver for i965G chipsets and above, which can be exploited to e.g. gain escalated privileges by modifying physical memory. Successful exploitation requires that the attacker is logged in to an X server and has access to the DRM. This has been fixed in 2.6.22.2
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=21f16289270447673a7263ccc0b22d562fb01ecb