Red Hat Binutils Vulnerabilities