Security vulnerabilities start off as innocent bugs, but with the right conditions they become security issues.
Is {SELinux,Samhain,grsecurity,etc...} completely bug-free? Not likely. If they add 10 bugs, what are the chances that one bug exists in the right environment for it to become a security vulnerability? (And that's being conservative, I've seen estimates more along the lines of 1 bug per 50 lines of code).
I'm not going to tell you not to run some block of code...in the end it's your machine, so you're the one that has to research it and figure it all out for yourself. Research /dev/kmem to see what conditions have to exist to exploit the system, and see if your environment matches.
Good example: A few years ago OpenBSD had an mbuf pointer bug that was shown to be remotely exploitable. The bug required MAC address manipulation and IPv6. The simplest solution, then, while waiting for the vendor to fix the bug permanently, was to configure the firewall to drop all IPv6 traffic (I didn't use it at the time anyways). Yeah, it's a remotely exploitable bug, but my system isn't vulnerable (and if they have permissions to change pf rules, the machine is already compromised).
Here's another good example:
grsecurity Linux kernel add-on vulnerability (with /dev/kmem). That link is to an old vulnerability, yes...but it's an example of "security" code lessening the security of the system.
Edit - not to discredit the authors of grsecurity, I used grsecurity for years back when Gentoo and HLFS were my main OS's. This is just an example.