GNU Binutils is prone to following security vulnerabilities: 1. A heap-based overflow vulnerability (CVE-2018-19931) patch: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5f60af5d24d181371d67534fa273dd221df20c07 2. An integer-overflow vulnerability (CVE-2018-19932) patch: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=beab453223769279cc1cef68a1622ab8978641f7 An attacker can exploit this issue to cause a denial-of-service condition. Due to the nature of this issue, code execution may be possible but this has not been confirmed. @maintainer(s): patches available. Gentoo Security Padawan (domhnall)
will be in 2.31.1 patchlevel 6
All affected versions are gone or masked. @security please proceed.
This issue was resolved and addressed in GLSA 201908-01 at https://security.gentoo.org/glsa/201908-01 by GLSA coordinator Aaron Bauman (b-man).