The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, may create an interpreter name string that is not NULL terminated, which could cause strings longer than PATH_MAX to be used, leading to buffer overflows that allow local users to cause a denial of service (hang) and possibly execute arbitrary code.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11195
https://exchange.xforce.ibmcloud.com/vulnerabilities/18025
https://bugzilla.fedora.us/show_bug.cgi?id=2336
http://www.securityfocus.com/bid/11646
http://www.redhat.com/support/errata/RHSA-2005-275.html
http://www.redhat.com/support/errata/RHSA-2004-537.html
http://www.redhat.com/support/errata/RHSA-2004-505.html
http://www.redhat.com/support/errata/RHSA-2004-504.html
http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt
http://www.debian.org/security/2006/dsa-1082
http://www.debian.org/security/2006/dsa-1070
http://www.debian.org/security/2006/dsa-1069
http://www.debian.org/security/2006/dsa-1067
http://secunia.com/advisories/20338
http://secunia.com/advisories/20202
http://secunia.com/advisories/20163