CVE-2026-2869

A vulnerability was identified in janet-lang janet up to 1.40.1. Affected by this vulnerability is the function janetc_varset of the file src/core/specials.c of the component handleattr Handler. The manipulation leads to out-of-bounds read. The attack can only be performed from a local environment. The exploit is publicly available and might be used. Upgrading to version 1.41.0 addresses this issue. The identifier of the patch is 2fabc80151a2b8834ee59cda8a70453f848b40e5. The affected component should be upgraded.
Configurations

Configuration 1 (hide)

cpe:2.3:a:janet-lang:janet:*:*:*:*:*:*:*:*

History

26 Feb 2026, 02:46

Type Values Removed Values Added
References () https://github.com/janet-lang/janet/ - () https://github.com/janet-lang/janet/ - Product
References () https://github.com/janet-lang/janet/commit/2fabc80151a2b8834ee59cda8a70453f848b40e5 - () https://github.com/janet-lang/janet/commit/2fabc80151a2b8834ee59cda8a70453f848b40e5 - Patch
References () https://github.com/janet-lang/janet/issues/1699 - () https://github.com/janet-lang/janet/issues/1699 - Exploit, Issue Tracking
References () https://github.com/janet-lang/janet/releases/tag/v1.41.0 - () https://github.com/janet-lang/janet/releases/tag/v1.41.0 - Release Notes
References () https://github.com/oneafter/0123/blob/main/ja1/repro - () https://github.com/oneafter/0123/blob/main/ja1/repro - Exploit
References () https://vuldb.com/?ctiid.347106 - () https://vuldb.com/?ctiid.347106 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.347106 - () https://vuldb.com/?id.347106 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.754589 - () https://vuldb.com/?submit.754589 - Third Party Advisory, VDB Entry
First Time Janet-lang janet
Janet-lang
CPE cpe:2.3:a:janet-lang:janet:*:*:*:*:*:*:*:*
Summary
  • (es) Se identificó una vulnerabilidad en janet-lang janet hasta la versión 1.40.1. Afectada por esta vulnerabilidad es la función janetc_varset del archivo src/core/specials.c del componente gestor handleattr. La manipulación conduce a una lectura fuera de límites. El ataque solo puede realizarse desde un entorno local. El exploit está disponible públicamente y podría ser utilizado. La actualización a la versión 1.41.0 soluciona este problema. El identificador del parche es 2fabc80151a2b8834ee59cda8a70453f848b40e5. El componente afectado debería ser actualizado.

21 Feb 2026, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-21 15:15

Updated : 2026-02-26 02:46


NVD link : CVE-2026-2869

Mitre link : CVE-2026-2869

CVE.ORG link : CVE-2026-2869


JSON object : View

Products Affected

janet-lang

  • janet
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-125

Out-of-bounds Read