The key information about the vulnerability from the screenshot can be summarized as follows: Vulnerability Type: Integer Overflow in Impact: Leads to Segmentation Fault ( ) in Trigger: A negative value passed to due to overflow in the allocation calculation: Environment: - OS: Linux x86-64 - Compiler: Clang - Build Configuration: Release - Affected Version: master branch Reproduction Steps: 1. Compile the raylib font test with AddressSanitizer enabled. 2. Run the fuzzer harness with attached input. Debugging Information: - ASAN report shows overflow with error: - GDB report indicates in Fix Approach: - A patch is being prepared to address the issue by adding boundary checks. CVE Assigned: CVE-2025-15534