A vulnerability was found in janet-lang janet up to 1.40.1. This affects the function os_strftime of the file src/core/os.c. Performing a manipulation results in out-of-bounds read. The attack must be initiated from a local position. The exploit has been made public and could be used. The patch is named 0f285855f0e34f9183956be5f16e045f54626bff. To fix this issue, it is recommended to deploy a patch.
[
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2026-2241-c7abb5aa",
"target": {
"file": "src/core/os.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"128725167025650217574484148366844978293",
"247281014111722666873986025330111886955",
"305429613425711644876884183633624756104",
"221598445345698823212175871958339458146",
"332907645979218961380833890601107707454",
"126901659997179346641197611252192396542",
"170047810911062469025069014244463663316",
"163792244844425392171980836489319192266",
"19354410151256381132366807507178052916",
"23978557248727922852073808701091761349",
"338791609037835934255770782327475587511"
]
},
"signature_version": "v1",
"source": "https://github.com/janet-lang/janet/commit/0f285855f0e34f9183956be5f16e045f54626bff"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-2241.json"