Vulnerability Description
A vulnerability was determined in janet-lang janet up to 1.40.1. This impacts the function janetc_if of the file src/core/specials.c. Executing a manipulation can lead to out-of-bounds read. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. This patch is called c43e06672cd9dacf2122c99f362120a17c34b391. It is advisable to implement a patch to correct this issue.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Janet-Lang | Janet | <= 1.40.1 |
Related Weaknesses (CWE)
References
- https://github.com/janet-lang/janet/Product
- https://github.com/janet-lang/janet/commit/c43e06672cd9dacf2122c99f362120a17c34bPatch
- https://github.com/janet-lang/janet/issues/1700ExploitIssue Tracking
- https://github.com/janet-lang/janet/issues/1702ExploitIssue Tracking
- https://github.com/oneafter/0123/blob/main/ja2/reproExploit
- https://vuldb.com/?ctiid.344981Permissions RequiredVDB Entry
- https://vuldb.com/?id.344981Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.754495Third Party AdvisoryVDB Entry
FAQ
What is CVE-2026-2242?
CVE-2026-2242 is a vulnerability with a CVSS score of 3.3 (LOW). A vulnerability was determined in janet-lang janet up to 1.40.1. This impacts the function janetc_if of the file src/core/specials.c. Executing a manipulation can lead to out-of-bounds read. The attac...
How severe is CVE-2026-2242?
CVE-2026-2242 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-2242?
Check the references section above for vendor advisories and patch information. Affected products include: Janet-Lang Janet.