I am using the 2.6.30 kernel sources from Kernel:linux-next and noticed that it has not yet been patched against the ’sock_sendpage()’ NULL Pointer Dereference vulnerability.
The threat is serious as it could allow a local user to gain root privileges.
Those who compile their own 2.6.x kernel should apply this patch (from Linus, check there for more info) .
Within your kernel source folder :
$ patch -u -p0 < sock_sendpage.patch
I hope an official patch will be released soon for all kernels. I did not check if the 11.1 kernel has already been patched or not.