SystemTap is vulnerable to denial of service (DoS).It is possible because staprun did not check if the module to be unloaded was previously loaded by SystemTap. A local, unprivileged user could use this flaw to unload an arbitrary kernel module that was not in use.
lists.fedoraproject.org/pipermail/package-announce/2010-November/051115.html
lists.fedoraproject.org/pipermail/package-announce/2010-November/051122.html
lists.fedoraproject.org/pipermail/package-announce/2010-November/051127.html
secunia.com/advisories/42256
secunia.com/advisories/42263
secunia.com/advisories/42318
secunia.com/advisories/46920
sources.redhat.com/git/gitweb.cgi?p=systemtap.git%3Ba=commit%3Bh=b7565b41228bea196cefa3a7d43ab67f8f9152e2
sources.redhat.com/git/gitweb.cgi?p=systemtap.git;a=commit;h=b7565b41228bea196cefa3a7d43ab67f8f9152e2
sources.redhat.com/ml/systemtap/2010-q4/msg00230.html
www.debian.org/security/2011/dsa-2348
www.redhat.com/support/errata/RHSA-2010-0894.html
www.securityfocus.com/bid/44917
www.securitytracker.com/id?1024754
access.redhat.com/errata/RHSA-2010:0894
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=653606
exchange.xforce.ibmcloud.com/vulnerabilities/63345