The SUSE Linux Enterprise 11 Service Pack 3 kernel was updated to fix a
critical privilege escalation security issue:
* CVE-2014-3153: The futex acquisition code in kernel/futex.c can be
used to gain ring0 access via the futex syscall. This could be used
for privilege escalation by non-root users. (bnc#880892)
download.suse.com/patch/finder/?keywords=0cdcfea3b263f03fc7b11c9e27c68106
download.suse.com/patch/finder/?keywords=2394b6ce8b434732566fe3cbf2a956f7
download.suse.com/patch/finder/?keywords=5d5df6a9a600dbe5fe09c19d8dc24b0e
download.suse.com/patch/finder/?keywords=8a869bd2122273831bd282fab2377076
download.suse.com/patch/finder/?keywords=a8f8feb5552e1da3b52f48f677f467cf
download.suse.com/patch/finder/?keywords=a9d9490d68822582cd43af9c0c2aa6d7
download.suse.com/patch/finder/?keywords=c905f5237a7e0ae4f9fdf0c325c0dbb2
download.suse.com/patch/finder/?keywords=f6e7ea94e8ad3ddbdf3d897e2a3ff6b8
download.suse.com/patch/finder/?keywords=fab06fd0fffc9ae59673101aeace943a
download.suse.com/patch/finder/?keywords=fd1bf222c9f9ff4cc32dae8bac451528
bugzilla.novell.com/880892