Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
1.9
Berry-lang Berry 1.1.0: Out-of-bounds read allows data exposure
CVE-2026-3285
Summary
A bug in Berry-lang Berry's string scanning function allows an attacker with local access to read sensitive data that they shouldn't. This can happen if an attacker has access to the system where Berry-lang Berry is installed. To fix this, apply the available patch to the affected version.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| berry-lang | berry | 1.1.0 | – |
Original title
A vulnerability was determined in berry-lang berry up to 1.1.0. The affected element is the function scan_string of the file src/be_lexer.c. This manipulation causes out-of-bounds read. The attack ...
Original description
A vulnerability was determined in berry-lang berry up to 1.1.0. The affected element is the function scan_string of the file src/be_lexer.c. This manipulation causes out-of-bounds read. The attack requires local access. The exploit has been publicly disclosed and may be utilized. Patch name: 7149c59a39ba44feca261b12f06089f265fec176. Applying a patch is the recommended action to fix this issue.
nvd CVSS2.0
1.7
nvd CVSS3.1
7.8
nvd CVSS4.0
1.9
Vulnerability type
CWE-119
Buffer Overflow
CWE-125
Out-of-bounds Read
- https://github.com/berry-lang/berry/ Product
- https://github.com/berry-lang/berry/commit/7149c59a39ba44feca261b12f06089f265fec... Patch
- https://github.com/berry-lang/berry/issues/509 Exploit Issue Tracking
- https://github.com/berry-lang/berry/pull/511 Issue Tracking
- https://github.com/oneafter/0211/blob/main/be/repro Exploit
- https://vuldb.com/?ctiid.348014 Permissions Required VDB Entry
- https://vuldb.com/?id.348014 Third Party Advisory VDB Entry
- https://vuldb.com/?submit.758872 Third Party Advisory VDB Entry
Published: 27 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026