{"schema_version":"1.7.2","id":"OESA-2026-2260","modified":"2026-05-09T12:33:28Z","published":"2026-05-09T12:33:28Z","upstream":["CVE-2026-40489"],"summary":"editorconfig security update","details":"EditorConfig makes it easy to maintain the correct coding style when switching between different text editors and between different projects. The EditorConfig project maintains a file format and plugins for various text editors which allow this file format to be read and used by those editors.\r\n\r\nSecurity Fix(es):\n\neditorconfig-core-c  is an EditorConfig core library for use by plugins supporting EditorConfig parsing. Versions up to and including 0.12.10 have a stack-based buffer overflow in ec_glob() that allows an attacker to crash any application using libeditorconfig by providing a specially crafted directory structure and .editorconfig file. This is an incomplete fix for CVE-2023-0341. The pcre_str buffer was protected in 0.12.6 but the adjacent l_pattern[8194] stack buffer received no equivalent protection. On Ubuntu 24.04, FORTIFY_SOURCE converts the overflow to SIGABRT (DoS). Version 0.12.11 contains an updated fix.(CVE-2026-40489)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS-SP1","name":"editorconfig","purl":"pkg:rpm/openEuler/editorconfig&distro=openEuler-24.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.12.6-3.oe2403sp1"}]}],"ecosystem_specific":{"aarch64":["editorconfig-0.12.6-3.oe2403sp1.aarch64.rpm","editorconfig-debuginfo-0.12.6-3.oe2403sp1.aarch64.rpm","editorconfig-debugsource-0.12.6-3.oe2403sp1.aarch64.rpm","editorconfig-devel-0.12.6-3.oe2403sp1.aarch64.rpm","editorconfig-libs-0.12.6-3.oe2403sp1.aarch64.rpm"],"src":["editorconfig-0.12.6-3.oe2403sp1.src.rpm"],"x86_64":["editorconfig-0.12.6-3.oe2403sp1.x86_64.rpm","editorconfig-debuginfo-0.12.6-3.oe2403sp1.x86_64.rpm","editorconfig-debugsource-0.12.6-3.oe2403sp1.x86_64.rpm","editorconfig-devel-0.12.6-3.oe2403sp1.x86_64.rpm","editorconfig-libs-0.12.6-3.oe2403sp1.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2260"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-40489"}],"database_specific":{"severity":"High"}}
