systemtap is vulnerable to denial of service. Two divide-by-zero flaws were found in the way SystemTap handled malformed debugging information in DWARF format. When SystemTap unprivileged mode was enabled, an unprivileged user in the stapusr group could use these flaws to crash the system. Additionally, a privileged user (root, or a member of the stapdev group) could trigger these flaws when tricked into instrumenting a specially-crafted ELF binary, even when unprivileged mode was not enabled.
openwall.com/lists/oss-security/2011/05/20/2
secunia.com/advisories/44802
sourceware.org/git/?p=systemtap.git%3Ba=commit%3Bh=fa2e3415185a28542d419a641ecd6cddd52e3cd9
sourceware.org/git/?p=systemtap.git;a=commit;h=fa2e3415185a28542d419a641ecd6cddd52e3cd9
www.mandriva.com/security/advisories?name=MDVSA-2011:155
www.securityfocus.com/bid/47934
access.redhat.com/errata/RHSA-2011:0842
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=702687
rhn.redhat.com/errata/RHSA-2011-0842.html