Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.
Closing, as this is not a GDB security vulnerability per the GDB Security Policy (SECURITY.txt). A denial of service when demangling a PE file does not cross the privilege boundaries that the GDB project considers security bugs. Per SECURITY.txt section "What Is Not A Security Bug": "denial of service attacks targeting GDB itself ... are not considered a security bug" and "simply triggering an internal error in GDB is not considered a security bug, since GDB has detected an issue and handled it in a non-exploitable manner." Additionally, SECURITY.txt notes: "due to there being already known bugs in GDB relating to undefined behavior triggered from malformed programs, further bugs in this area should still be reported, but are unlikely to be given high priority." While this is a legitimate bug in libiberty's cp-demangle.c (shared with binutils), it does not warrant a CVE or special security handling. The fix will be addressed upstream and will reach Fedora GDB through the normal release process. A backport is not warranted given the low severity and nature of the issue.