The load_elf_binary function in the binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly check return values from calls to the kernel_read function, which may allow local users to modify sensitive memory in a setuid program and execute arbitrary code.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9450
https://exchange.xforce.ibmcloud.com/vulnerabilities/18025
https://bugzilla.fedora.us/show_bug.cgi?id=2336
http://www.securityfocus.com/bid/11646
http://www.redhat.com/support/errata/RHSA-2004-549.html
http://www.redhat.com/support/errata/RHSA-2004-505.html
http://www.redhat.com/support/errata/RHSA-2004-504.html
http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt
http://www.debian.org/security/2006/dsa-1082
http://www.debian.org/security/2006/dsa-1070
http://www.debian.org/security/2006/dsa-1069
http://www.debian.org/security/2006/dsa-1067
http://secunia.com/advisories/20338
http://secunia.com/advisories/20202
http://secunia.com/advisories/20163