Red Hat Devtools
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Red Hat Devtools.
Recent Red Hat Devtools Security Advisories
| Advisory | Title | Published |
|---|---|---|
| RHSA-2023:3269 | (RHSA-2023:3269) Moderate: devtoolset-12-binutils security update | May 23, 2023 |
| RHSA-2021:4730 | (RHSA-2021:4730) Moderate: devtoolset-11-binutils security update | November 18, 2021 |
| RHSA-2021:4729 | (RHSA-2021:4729) Moderate: devtoolset-11-annobin security update | November 18, 2021 |
| RHSA-2021:4724 | (RHSA-2021:4724) Moderate: devtoolset-10-annobin security update | November 17, 2021 |
| RHSA-2021:4723 | (RHSA-2021:4723) Moderate: devtoolset-10-binutils security update | November 17, 2021 |
| RHSA-2021:4669 | (RHSA-2021:4669) Moderate: devtoolset-11-gcc security update | November 15, 2021 |
| RHSA-2021:4039 | (RHSA-2021:4039) Moderate: devtoolset-10-gcc security update | November 1, 2021 |
By the Year
In 2026 there have been 0 vulnerabilities in Red Hat Devtools. Devtools did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 1 | 7.50 |
It may take a day or so for new Devtools vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Red Hat Devtools Security Vulnerabilities
Memory Leak in Go RSA (golang-fips/openssl) Leads to Resource Exhaustion
CVE-2024-1394
7.5 - High
- March 21, 2024
A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey and ctx. That function uses named return parameters to free pkey and ctx if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey and ctx will be nil inside the deferred function that should free them.
Memory Leak
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Red Hat Devtools or by Red Hat? Click the Watch button to subscribe.