systemtap is vulnerable to denial of service. An invalid pointer read flaw was found in the way SystemTap handled malformed debugging information in DWARF format. When SystemTap unprivileged mode was enabled, an unprivileged user in the stapusr group could use this flaw to crash the system or, potentially, read arbitrary kernel memory. Additionally, a privileged user (root, or a member of the stapdev group) could trigger this flaw when tricked into instrumenting a specially-crafted ELF binary, even when unprivileged mode was not enabled.
lists.opensuse.org/opensuse-updates/2013-03/msg00057.html
permalink.gmane.org/gmane.comp.security.oss.general/6987
rhn.redhat.com/errata/RHSA-2012-0376.html
securitytracker.com/id?1026777
sourceware.org/bugzilla/show_bug.cgi?id=13714
sourceware.org/git/?p=systemtap.git%3Ba=commit%3Bh=64b0cff3b
sourceware.org/git/?p=systemtap.git;a=commit;h=64b0cff3b
access.redhat.com/errata/RHSA-2012:0376
access.redhat.com/security/updates/classification/#moderate