Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2240: Out-of-Bounds Read in janet-lang janet

0
Medium
VulnerabilityCVE-2026-2240cvecve-2026-2240
Published: Mon Feb 09 2026 (02/09/2026, 15:32:10 UTC)
Source: CVE Database V5
Vendor/Project: janet-lang
Product: janet

Description

A vulnerability has been found in janet-lang janet up to 1.40.1. The impacted element is the function janetc_pop_funcdef of the file src/core/compile.c. Such manipulation leads to out-of-bounds read. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. The name of the patch is 4dd08a4cdef5b1c42d9a2c19fc24412e97ef51d5. A patch should be applied to remediate this issue.

AI-Powered Analysis

AILast updated: 02/09/2026, 16:15:57 UTC

Technical Analysis

CVE-2026-2240 is a vulnerability in the janet-lang janet interpreter, affecting versions 1.40.0 and 1.40.1. The issue resides in the function janetc_pop_funcdef located in src/core/compile.c, where improper handling of function definitions leads to an out-of-bounds read condition. This flaw allows an attacker with local access and low privileges to read memory outside the bounds of allocated buffers, which can result in unintended information disclosure or cause the application to behave unpredictably, potentially leading to crashes or denial of service. The vulnerability does not require user interaction or elevated privileges beyond local access, and it does not affect confidentiality, integrity, or availability directly but poses a risk of leaking sensitive memory contents. The vulnerability has been publicly disclosed, and a patch is available under commit 4dd08a4cdef5b1c42d9a2c19fc24412e97ef51d5. The CVSS 4.0 vector indicates low attack complexity and privileges required, with no user interaction needed. While no known exploits are currently in the wild, the public disclosure increases the risk of exploitation attempts. Organizations using janet-lang, particularly in development or scripting environments, should prioritize patching to prevent potential exploitation.

Potential Impact

For European organizations, the primary impact of CVE-2026-2240 lies in potential information disclosure and application instability within systems running vulnerable janet-lang versions. Since exploitation requires local access, the threat is mainly to internal users or attackers who have already gained some foothold in the network. This could facilitate further lateral movement or privilege escalation if sensitive memory contents are exposed. The vulnerability may affect development environments, automated scripting, or embedded systems using janet-lang, potentially disrupting operations or exposing proprietary code and data. Given the medium severity, the risk is moderate but non-negligible, especially for organizations with stringent data protection requirements under GDPR. Failure to patch could lead to compliance issues if sensitive data is leaked. The lack of known active exploits reduces immediate risk but does not eliminate the threat, particularly in environments with less controlled local access.

Mitigation Recommendations

European organizations should immediately identify all systems running janet-lang versions 1.40.0 or 1.40.1 and apply the official patch referenced by commit 4dd08a4cdef5b1c42d9a2c19fc24412e97ef51d5. Since exploitation requires local access, enforcing strict access controls and user privilege management is critical to limit exposure. Implementing application whitelisting and monitoring local user activities can help detect suspicious behavior. Regularly audit development and production environments for unauthorized janet-lang usage. Employ memory protection mechanisms and sandboxing where possible to contain potential out-of-bounds reads. Additionally, maintain up-to-date backups and incident response plans to quickly address any exploitation attempts. Educate developers and system administrators about this vulnerability to ensure timely patch deployment and reduce risk from insider threats or compromised local accounts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-09T09:38:25.338Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698a04d04b57a58fa15c44d9

Added to database: 2/9/2026, 4:01:20 PM

Last enriched: 2/9/2026, 4:15:57 PM

Last updated: 2/9/2026, 5:27:00 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats