Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-40489— editorconfig-core-c has incomplete fix for CVE-2023-0341

EPSS 0.02% · P4
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-40489

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
editorconfig-core-c has incomplete fix for CVE-2023-0341
Source: NVD (National Vulnerability Database)
Vulnerability Description
editorconfig-core-c is an EditorConfig core library for use by plugins supporting EditorConfig parsing. Versions up to and including 0.12.10 have a stack-based buffer overflow in ec_glob() that allows an attacker to crash any application using libeditorconfig by providing a specially crafted directory structure and .editorconfig file. This is an incomplete fix for CVE-2023-0341. The pcre_str buffer was protected in 0.12.6 but the adjacent l_pattern[8194] stack buffer received no equivalent protection. On Ubuntu 24.04, FORTIFY_SOURCE converts the overflow to SIGABRT (DoS). Version 0.12.11 contains an updated fix.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
栈缓冲区溢出
Source: NVD (National Vulnerability Database)
Vulnerability Title
EditorConfig 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
EditorConfig是EditorConfig开源的一个应用程序。使得在不同的文本编辑器和不同的项目之间切换时,可以轻松地保持正确的编码样式。 EditorConfig 0.12.10及之前版本存在安全漏洞,该漏洞源于ec_glob函数存在基于栈的缓冲区溢出,可能导致应用程序崩溃。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
editorconfigeditorconfig-core-c < 0.12.11 -

II. Public POCs for CVE-2026-40489

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-40489

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-40489

No comments yet


Leave a comment