A vulnerability was identified in raysan5 raylib up to 909f040. Affected by this issue is the function LoadFontData of the file src/rtext.c. The manipulation leads to integer overflow. The attack can only be performed from a local environment. The exploit is publicly available and might be used. The identifier of the patch is 5a3391fdce046bc5473e52afbd835dd2dc127146. It is suggested to install a patch to address this issue.
Metrics
Affected Vendors & Products
References
History
Mon, 19 Jan 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 19 Jan 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Raylib
Raylib raylib |
|
| Vendors & Products |
Raylib
Raylib raylib |
Sun, 18 Jan 2026 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in raysan5 raylib up to 909f040. Affected by this issue is the function LoadFontData of the file src/rtext.c. The manipulation leads to integer overflow. The attack can only be performed from a local environment. The exploit is publicly available and might be used. The identifier of the patch is 5a3391fdce046bc5473e52afbd835dd2dc127146. It is suggested to install a patch to address this issue. | |
| Title | raysan5 raylib rtext.c LoadFontData integer overflow | |
| Weaknesses | CWE-189 CWE-190 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2026-01-18T06:32:06.449Z
Updated: 2026-01-18T06:32:06.449Z
Reserved: 2026-01-17T16:11:45.728Z
Link: CVE-2025-15534
No data.
Status : Received
Published: 2026-01-18T07:16:01.963
Modified: 2026-01-18T07:16:01.963
Link: CVE-2025-15534