stap-server in SystemTap before 1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in stap command-line arguments in a request.
lists.fedoraproject.org/pipermail/package-announce/2010-February/035201.html
lists.fedoraproject.org/pipermail/package-announce/2010-February/035261.html
lists.fedoraproject.org/pipermail/package-announce/2010-January/034036.html
lists.fedoraproject.org/pipermail/package-announce/2010-January/034041.html
lists.fedoraproject.org/pipermail/scm-commits/2010-February/394714.html
lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html
secunia.com/advisories/38154
secunia.com/advisories/38216
secunia.com/advisories/38765
secunia.com/advisories/39656
sourceware.org/bugzilla/show_bug.cgi?id=11105
sourceware.org/ml/systemtap/2010-q1/msg00142.html
sourceware.org/systemtap/ftp/releases/systemtap-1.1.tar.gz
www.redhat.com/support/errata/RHSA-2010-0124.html
www.vupen.com/english/advisories/2010/0169
www.vupen.com/english/advisories/2010/1001
bugzilla.redhat.com/show_bug.cgi?id=550172
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11417