stap-server in SystemTap before 1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in stap command-line arguments in a request.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11417
https://bugzilla.redhat.com/show_bug.cgi?id=550172
http://www.vupen.com/english/advisories/2010/1001
http://www.vupen.com/english/advisories/2010/0169
http://www.redhat.com/support/errata/RHSA-2010-0124.html
http://sourceware.org/systemtap/ftp/releases/systemtap-1.1.tar.gz
http://sourceware.org/ml/systemtap/2010-q1/msg00142.html
http://sourceware.org/bugzilla/show_bug.cgi?id=11105
http://secunia.com/advisories/39656
http://secunia.com/advisories/38765
http://secunia.com/advisories/38216
http://secunia.com/advisories/38154
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html
http://lists.fedoraproject.org/pipermail/scm-commits/2010-February/394714.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034041.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034036.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035261.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035201.html