CVE-2026-2241: Out-of-Bounds Read in janet-lang janet
A vulnerability was found in janet-lang janet up to 1.40.1. This affects the function os_strftime of the file src/core/os.c. Performing a manipulation results in out-of-bounds read. The attack must be initiated from a local position. The exploit has been made public and could be used. The patch is named 0f285855f0e34f9183956be5f16e045f54626bff. To fix this issue, it is recommended to deploy a patch.
AI Analysis
Technical Summary
CVE-2026-2241 is a medium severity vulnerability identified in the janet-lang janet runtime up to version 1.40.1. The flaw exists in the os_strftime function located in src/core/os.c, where improper handling of input data leads to an out-of-bounds read condition. This vulnerability arises when the function processes manipulated input, causing it to read memory beyond the intended buffer boundaries. Such out-of-bounds reads can result in exposure of sensitive memory contents or cause application crashes due to invalid memory access. The attack vector is local, meaning an attacker must have local access with low privileges to trigger the flaw; no user interaction or authentication is required beyond this. The vulnerability does not affect confidentiality, integrity, or availability on a large scale but can lead to limited information disclosure or denial of service in affected systems. The patch identified by commit 0f285855f0e34f9183956be5f16e045f54626bff addresses the issue by correcting the bounds checking in os_strftime. While public exploit code exists, there are no reports of active exploitation in the wild. The vulnerability is relevant primarily to environments running janet-lang versions 1.40.0 and 1.40.1, which may include embedded systems, development environments, or specialized applications relying on this language runtime.
Potential Impact
The primary impact of CVE-2026-2241 is the potential for local attackers to read memory beyond intended boundaries, which can lead to limited information disclosure. This may expose sensitive data residing in adjacent memory areas, potentially aiding further attacks or reconnaissance. Additionally, the out-of-bounds read could cause application instability or crashes, resulting in denial of service for affected processes. Since exploitation requires local access with low privileges, remote attackers cannot directly exploit this vulnerability. However, in multi-user systems or environments where untrusted users have local access, this vulnerability could be leveraged to escalate attacks or disrupt services. The scope is limited to systems running vulnerable janet-lang versions, which may be niche but critical in certain development or embedded contexts. Organizations relying on janet-lang for scripting or automation should consider the risk of data leakage and service disruption, especially in shared or sensitive environments.
Mitigation Recommendations
To mitigate CVE-2026-2241, organizations should promptly apply the official patch identified by commit 0f285855f0e34f9183956be5f16e045f54626bff to all affected janet-lang installations, upgrading beyond version 1.40.1. In addition to patching, restrict local access to systems running janet-lang to trusted users only, minimizing the risk of exploitation by unprivileged attackers. Employ strict access controls and monitoring on multi-user systems where janet-lang is used. Conduct code audits and testing for any custom extensions or integrations with janet-lang that might interact with os_strftime or related functions to ensure no residual vulnerabilities exist. Consider implementing runtime memory protection mechanisms such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) to reduce the impact of out-of-bounds reads. Finally, maintain updated inventories of software versions in use to quickly identify and remediate vulnerable instances.
Affected Countries
United States, Germany, Japan, South Korea, United Kingdom, France, Canada, Australia, Netherlands, Sweden
CVE-2026-2241: Out-of-Bounds Read in janet-lang janet
Description
A vulnerability was found in janet-lang janet up to 1.40.1. This affects the function os_strftime of the file src/core/os.c. Performing a manipulation results in out-of-bounds read. The attack must be initiated from a local position. The exploit has been made public and could be used. The patch is named 0f285855f0e34f9183956be5f16e045f54626bff. To fix this issue, it is recommended to deploy a patch.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-2241 is a medium severity vulnerability identified in the janet-lang janet runtime up to version 1.40.1. The flaw exists in the os_strftime function located in src/core/os.c, where improper handling of input data leads to an out-of-bounds read condition. This vulnerability arises when the function processes manipulated input, causing it to read memory beyond the intended buffer boundaries. Such out-of-bounds reads can result in exposure of sensitive memory contents or cause application crashes due to invalid memory access. The attack vector is local, meaning an attacker must have local access with low privileges to trigger the flaw; no user interaction or authentication is required beyond this. The vulnerability does not affect confidentiality, integrity, or availability on a large scale but can lead to limited information disclosure or denial of service in affected systems. The patch identified by commit 0f285855f0e34f9183956be5f16e045f54626bff addresses the issue by correcting the bounds checking in os_strftime. While public exploit code exists, there are no reports of active exploitation in the wild. The vulnerability is relevant primarily to environments running janet-lang versions 1.40.0 and 1.40.1, which may include embedded systems, development environments, or specialized applications relying on this language runtime.
Potential Impact
The primary impact of CVE-2026-2241 is the potential for local attackers to read memory beyond intended boundaries, which can lead to limited information disclosure. This may expose sensitive data residing in adjacent memory areas, potentially aiding further attacks or reconnaissance. Additionally, the out-of-bounds read could cause application instability or crashes, resulting in denial of service for affected processes. Since exploitation requires local access with low privileges, remote attackers cannot directly exploit this vulnerability. However, in multi-user systems or environments where untrusted users have local access, this vulnerability could be leveraged to escalate attacks or disrupt services. The scope is limited to systems running vulnerable janet-lang versions, which may be niche but critical in certain development or embedded contexts. Organizations relying on janet-lang for scripting or automation should consider the risk of data leakage and service disruption, especially in shared or sensitive environments.
Mitigation Recommendations
To mitigate CVE-2026-2241, organizations should promptly apply the official patch identified by commit 0f285855f0e34f9183956be5f16e045f54626bff to all affected janet-lang installations, upgrading beyond version 1.40.1. In addition to patching, restrict local access to systems running janet-lang to trusted users only, minimizing the risk of exploitation by unprivileged attackers. Employ strict access controls and monitoring on multi-user systems where janet-lang is used. Conduct code audits and testing for any custom extensions or integrations with janet-lang that might interact with os_strftime or related functions to ensure no residual vulnerabilities exist. Consider implementing runtime memory protection mechanisms such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) to reduce the impact of out-of-bounds reads. Finally, maintain updated inventories of software versions in use to quickly identify and remediate vulnerable instances.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-09T09:38:29.872Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698a0bd54b57a58fa15e776f
Added to database: 2/9/2026, 4:31:17 PM
Last enriched: 2/23/2026, 9:13:14 PM
Last updated: 3/26/2026, 9:47:38 PM
Views: 66
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.