With the LG Revolution being made available yesterday at Verizon for $249.99 on two-year contract, developers at RootzWiki have already gotten their hands on it and started tearing it apart. One of the first goals was to obtain superuser access and that goal was quickly achieved.
Surprisingly, LG was lax in their security and left an old, well known vulnerability in the system. The “rageagainstthecage” exploit was developed by Sebastian Krahmer who has more recently developed a similar exploit to obtain root on Gingerbread. The newer exploit was not required for LG Revolution, as the Froyo build used on the device remains vulnerable to the older exploit. The steps are pretty standard for manually rooting, involving using the ADB program included with the Android SDK to push several files to the device, execute them, and install programs to the /system partition to make the root permanent.
A warning is included with the post, stating that there is no recovery available for this device, so there is not yet a way to easily revert the root exploit at this time. Manually reverting should be possible however, and reversing the provided steps (erasing su, rageagainstthecage, and SuperUser) should be sufficient to return to “stock” un-rooted status.