CVE-2026-40489
LowVulnerability Description
editorconfig-core-c is an EditorConfig core library for use by plugins supporting EditorConfig parsing. Versions up to and including 0.12.10 have a stack-based buffer overflow in ec_glob() that allows an attacker to crash any application using libeditorconfig by providing a specially crafted directory structure and .editorconfig file. This is an incomplete fix for CVE-2023-0341. The pcre_str buffer was protected in 0.12.6 but the adjacent l_pattern[8194] stack buffer received no equivalent protection. On Ubuntu 24.04, FORTIFY_SOURCE converts the overflow to SIGABRT (DoS). Version 0.12.11 contains an updated fix.
CVE-2026-40489
CVE-2026-40489
References & Resources
-
https://github.com/editorconfig/editorconfig-core-c/commit/5159be88ad50641d9843289adda791ba300421ffsecurity-advisories@github.com
-
https://github.com/editorconfig/editorconfig-core-c/releases/tag/v0.12.11security-advisories@github.com
-
https://github.com/editorconfig/editorconfig-core-c/security/advisories/GHSA-97xg-vrcq-254hsecurity-advisories@github.com
Severity Details
Weakness Type (CWE)
Stack-based Buffer Overflow
- Description
- A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
- Exploit Likelihood
- High
- Typical Severity
- High
- Abstraction Level
- Variant
Key Information
- Published Date
- April 18, 2026
