CVE-2026-2242

Source
https://cve.org/CVERecord?id=CVE-2026-2242
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-2242.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-2242
Published
2026-02-09T18:16:08.857Z
Modified
2026-03-13T11:37:00.726593Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability was determined in janet-lang janet up to 1.40.1. This impacts the function janetc_if of the file src/core/specials.c. Executing a manipulation can lead to out-of-bounds read. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. This patch is called c43e06672cd9dacf2122c99f362120a17c34b391. It is advisable to implement a patch to correct this issue.

References

Affected packages

Git / github.com/janet-lang/janet

Affected ranges

Type
GIT
Repo
https://github.com/janet-lang/janet
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "1.40.1"
        }
    ]
}

Affected versions

0.*
0.1.0
0.2.0
0.3.0
1.*
1.19.1-rc1
v0.*
v0.4.0
v0.4.1
v0.5.0
v0.6.0
v1.*
v1.0.0
v1.1.0
v1.10.0
v1.10.1
v1.11.0
v1.11.1
v1.11.2
v1.11.3
v1.12.0
v1.12.1
v1.12.2
v1.13.0
v1.13.1
v1.14.1
v1.14.2
v1.15.0
v1.15.1
v1.15.2
v1.15.3
v1.15.4
v1.15.5
v1.16.0
v1.16.1
v1.17.0
v1.17.1
v1.17.2
v1.18.0
v1.18.1
v1.19.0
v1.19.1
v1.19.2
v1.2.0
v1.20.0
v1.21.0
v1.21.1
v1.21.2
v1.22.0
v1.23.0
v1.24.0
v1.24.1
v1.25.0
v1.25.1
v1.26.0
v1.27.0
v1.28.0
v1.29.0
v1.29.1
v1.3.0
v1.3.1
v1.30.0
v1.31.0
v1.32.0
v1.32.1
v1.33.0
v1.34.0
v1.35.0
v1.35.1
v1.35.2
v1.36.0
v1.37.0
v1.37.1
v1.38.0
v1.39.0
v1.39.1
v1.4.0
v1.40.0
v1.40.1
v1.5.0
v1.5.1
v1.6.0
v1.7.0
v1.8.0
v1.8.1
v1.9.0
v1.9.1

Database specific

vanir_signatures
[
    {
        "signature_type": "Function",
        "deprecated": false,
        "id": "CVE-2026-2242-96cdc6fc",
        "target": {
            "file": "src/core/specials.c",
            "function": "janetc_if"
        },
        "digest": {
            "length": 2286.0,
            "function_hash": "16514016381390146507687179303033039226"
        },
        "signature_version": "v1",
        "source": "https://github.com/janet-lang/janet/commit/c43e06672cd9dacf2122c99f362120a17c34b391"
    },
    {
        "signature_type": "Line",
        "deprecated": false,
        "id": "CVE-2026-2242-d06092f9",
        "target": {
            "file": "src/core/specials.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "134961270482347083615491625704226475582",
                "337414601554390145901963875142329261540",
                "257063007698266830715566662527555059207",
                "251430999923571613545547465521654561525",
                "174659958993681944712580303641614256449"
            ]
        },
        "signature_version": "v1",
        "source": "https://github.com/janet-lang/janet/commit/c43e06672cd9dacf2122c99f362120a17c34b391"
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-2242.json"