CVE-2026-3285

A vulnerability was determined in berry-lang berry up to 1.1.0. The affected element is the function scan_string of the file src/be_lexer.c. This manipulation causes out-of-bounds read. The attack requires local access. The exploit has been publicly disclosed and may be utilized. Patch name: 7149c59a39ba44feca261b12f06089f265fec176. Applying a patch is the recommended action to fix this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:berry-lang:berry:1.1.0:*:*:*:*:*:*:*

History

02 Mar 2026, 15:41

Type Values Removed Values Added
References () https://github.com/berry-lang/berry/ - () https://github.com/berry-lang/berry/ - Product
References () https://github.com/berry-lang/berry/commit/7149c59a39ba44feca261b12f06089f265fec176 - () https://github.com/berry-lang/berry/commit/7149c59a39ba44feca261b12f06089f265fec176 - Patch
References () https://github.com/berry-lang/berry/issues/509 - () https://github.com/berry-lang/berry/issues/509 - Exploit, Issue Tracking
References () https://github.com/berry-lang/berry/pull/511 - () https://github.com/berry-lang/berry/pull/511 - Issue Tracking
References () https://github.com/oneafter/0211/blob/main/be/repro - () https://github.com/oneafter/0211/blob/main/be/repro - Exploit
References () https://vuldb.com/?ctiid.348014 - () https://vuldb.com/?ctiid.348014 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.348014 - () https://vuldb.com/?id.348014 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.758872 - () https://vuldb.com/?submit.758872 - Third Party Advisory, VDB Entry
First Time Berry-lang berry
Berry-lang
CPE cpe:2.3:a:berry-lang:berry:1.1.0:*:*:*:*:*:*:*

27 Feb 2026, 14:06

Type Values Removed Values Added
Summary
  • (es) Se determinó una vulnerabilidad en berry-lang berry hasta la versión 1.1.0. El elemento afectado es la función scan_string del archivo src/be_lexer.c. Esta manipulación causa una lectura fuera de límites. El ataque requiere acceso local. El exploit ha sido divulgado públicamente y puede ser utilizado. Nombre del parche: 7149c59a39ba44feca261b12f06089f265fec176. Aplicar un parche es la acción recomendada para solucionar este problema.

27 Feb 2026, 03:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-27 03:16

Updated : 2026-03-02 15:41


NVD link : CVE-2026-3285

Mitre link : CVE-2026-3285

CVE.ORG link : CVE-2026-3285


JSON object : View

Products Affected

berry-lang

  • berry
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-125

Out-of-bounds Read