A vulnerability was determined in janet-lang janet up to 1.40.1. This impacts the function janetc_if of the file src/core/specials.c. Executing a manipulation can lead to out-of-bounds read. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. This patch is called c43e06672cd9dacf2122c99f362120a17c34b391. It is advisable to implement a patch to correct this issue.
[
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2026-2242-96cdc6fc",
"target": {
"file": "src/core/specials.c",
"function": "janetc_if"
},
"digest": {
"length": 2286.0,
"function_hash": "16514016381390146507687179303033039226"
},
"signature_version": "v1",
"source": "https://github.com/janet-lang/janet/commit/c43e06672cd9dacf2122c99f362120a17c34b391"
},
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2026-2242-d06092f9",
"target": {
"file": "src/core/specials.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"134961270482347083615491625704226475582",
"337414601554390145901963875142329261540",
"257063007698266830715566662527555059207",
"251430999923571613545547465521654561525",
"174659958993681944712580303641614256449"
]
},
"signature_version": "v1",
"source": "https://github.com/janet-lang/janet/commit/c43e06672cd9dacf2122c99f362120a17c34b391"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-2242.json"