Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-8238-1 | EditorConfig vulnerability |
Mon, 20 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Editorconfig
Editorconfig editorconfig |
|
| Vendors & Products |
Editorconfig
Editorconfig editorconfig |
Sat, 18 Apr 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | editorconfig-core-c is an EditorConfig core library for use by plugins supporting EditorConfig parsing. Versions up to and including 0.12.10 have a stack-based buffer overflow in ec_glob() that allows an attacker to crash any application using libeditorconfig by providing a specially crafted directory structure and .editorconfig file. This is an incomplete fix for CVE-2023-0341. The pcre_str buffer was protected in 0.12.6 but the adjacent l_pattern[8194] stack buffer received no equivalent protection. On Ubuntu 24.04, FORTIFY_SOURCE converts the overflow to SIGABRT (DoS). Version 0.12.11 contains an updated fix. | |
| Title | editorconfig-core-c has incomplete fix for CVE-2023-0341 | |
| Weaknesses | CWE-121 CWE-787 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-20T16:15:31.570Z
Reserved: 2026-04-13T19:50:42.114Z
Link: CVE-2026-40489
Updated: 2026-04-20T16:10:37.295Z
Status : Deferred
Published: 2026-04-18T02:16:11.827
Modified: 2026-04-20T18:59:16.353
Link: CVE-2026-40489
No data.
OpenCVE Enrichment
Updated: 2026-04-20T14:58:54Z
Ubuntu USN