Gentoo Linux Security Advisory 202208-30 - Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service. Versions less than 2.38 are affected.
3492b7e37b66d4f9324cc649d3ddb8d5d72c71a1f62f4a5b2a7912b8a19002b3
Ubuntu Security Notice 5341-1 - It was discovered that GNU binutils incorrectly handled checks for memory allocation when parsing relocs in a corrupt file. An attacker could possibly use this issue to cause a denial of service. It was discovered that GNU binutils incorrectly handled certain corrupt DWARF debug sections. An attacker could possibly use this issue to cause GNU binutils to consume memory, resulting in a denial of service.
5dd2bf59a94e2bb71ef4757fef7d8dbca421e60dbbba4fbcd60d04f7c2ebb405
Red Hat Security Advisory 2021-4364-03 - The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities. Issues addressed include a buffer overflow vulnerability.
9e8ecefe9e258408b2356c55e4062b3f368abfcefea5d6fd573bc4a272fba168
Ubuntu Security Notice 5124-1 - It was discovered that GNU binutils incorrectly handled certain hash lookups. An attacker could use this issue to cause GNU binutils to crash, resulting in a denial of service, or possibly execute arbitrary code. It was discovered that GNU binutils incorrectly handled certain corrupt DWARF debug sections. An attacker could possibly use this issue to cause GNU binutils to consume memory, resulting in a denial of service. Various other issues were also addressed.
df287a7526a8c70c62b65f6a2e768315dbf839f82c15f2528f55fef66be08ce9