A vulnerability was identified in raysan5 raylib up to 909f040. Affected by this issue is the function LoadFontData of the file src/rtext.c. The manipulation leads to integer overflow. The attack can only be performed from a local environment. The exploit is publicly available and might be used. The identifier of the patch is 5a3391fdce046bc5473e52afbd835dd2dc127146. It is suggested to install a patch to address this issue.
Metrics
Affected Vendors & Products
References
History
Sun, 18 Jan 2026 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in raysan5 raylib up to 909f040. Affected by this issue is the function LoadFontData of the file src/rtext.c. The manipulation leads to integer overflow. The attack can only be performed from a local environment. The exploit is publicly available and might be used. The identifier of the patch is 5a3391fdce046bc5473e52afbd835dd2dc127146. It is suggested to install a patch to address this issue. | |
| Title | raysan5 raylib rtext.c LoadFontData integer overflow | |
| Weaknesses | CWE-189 CWE-190 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-01-18T06:32:06.449Z
Reserved: 2026-01-17T16:11:45.728Z
Link: CVE-2025-15534
No data.
Status : Received
Published: 2026-01-18T07:16:01.963
Modified: 2026-01-18T07:16:01.963
Link: CVE-2025-15534
No data.
OpenCVE Enrichment
No data.