CVE-2026-2242

medium

Description

A vulnerability was determined in janet-lang janet up to 1.40.1. This impacts the function janetc_if of the file src/core/specials.c. Executing a manipulation can lead to out-of-bounds read. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. This patch is called c43e06672cd9dacf2122c99f362120a17c34b391. It is advisable to implement a patch to correct this issue.

References

https://vuldb.com/?submit.754495

https://vuldb.com/?id.344981

https://vuldb.com/?ctiid.344981

https://github.com/oneafter/0123/blob/main/ja2/repro

https://github.com/janet-lang/janet/issues/1702

https://github.com/janet-lang/janet/issues/1700

https://github.com/janet-lang/janet/commit/c43e06672cd9dacf2122c99f362120a17c34b391

https://github.com/janet-lang/janet/

Details

Source: Mitre, NVD

Published: 2026-02-09

Updated: 2026-02-09

Risk Information

CVSS v2

Base Score: 1.7

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:P

Severity: Low

CVSS v3

Base Score: 3.3

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Severity: Low

CVSS v4

Base Score: 4.8

Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Severity: Medium