Buffer Underflow The advisory has been revoked - it doesn't affect any version of package bootc.src  (opens in a new tab)


Threat Intelligence

EPSS
0.74% (74th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL10-BOOTCSRC-15147809
  • published30 Jan 2026
  • disclosed6 May 2025

Introduced: 6 May 2025

CVE-2025-4373  (opens in a new tab)
CWE-124  (opens in a new tab)

Amendment

The Red Hat security team deemed this advisory irrelevant for RHEL:10.

NVD Description

Note: Versions mentioned in the description apply only to the upstream bootc.src package and not the bootc.src package as distributed by RHEL.

A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.