UBUNTU-CVE-2026-27903

Source
https://ubuntu.com/security/CVE-2026-27903
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-27903.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2026-27903
Upstream
Published
2026-02-26T00:00:00Z
Modified
2026-02-28T06:20:44.249180Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Prior to version 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.3, matchOne() performs unbounded recursive backtracking when a glob pattern contains multiple non-adjacent ** (GLOBSTAR) segments and the input path does not match. The time complexity is O(C(n, k)) -- binomial -- where n is the number of path segments and k is the number of globstars. With k=11 and n=30, a call to the default minimatch() API stalls for roughly 5 seconds. With k=13, it exceeds 15 seconds. No memoization or call budget exists to bound this behavior. Any application where an attacker can influence the glob pattern passed to minimatch() is vulnerable. The realistic attack surface includes build tools and task runners that accept user-supplied glob arguments (ESLint, Webpack, Rollup config), multi-tenant systems where one tenant configures glob-based rules that run in a shared process, admin or developer interfaces that accept ignore-rule or filter configuration as globs, and CI/CD pipelines that evaluate user-submitted config files containing glob patterns. An attacker who can place a crafted pattern into any of these paths can stall the Node.js event loop for tens of seconds per invocation. The pattern is 56 bytes for a 5-second stall and does not require authentication in contexts where pattern input is part of the feature. Versions 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.3 fix the issue.

References

Affected packages

Ubuntu:18.04:LTS
node-minimatch

Package

Name
node-minimatch
Purl
pkg:deb/ubuntu/node-minimatch@3.0.4-3+deb10u1build0.18.04.1?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.0.4-1
3.0.4-3
3.0.4-3+deb10u1build0.18.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "node-minimatch",
            "binary_version": "3.0.4-3+deb10u1build0.18.04.1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-27903.json"
Ubuntu:20.04:LTS
node-minimatch

Package

Name
node-minimatch
Purl
pkg:deb/ubuntu/node-minimatch@3.0.4-4ubuntu0.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.0.4-3
3.0.4-4
3.0.4-4ubuntu0.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "node-minimatch",
            "binary_version": "3.0.4-4ubuntu0.1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-27903.json"
Ubuntu:22.04:LTS
node-minimatch

Package

Name
node-minimatch
Purl
pkg:deb/ubuntu/node-minimatch@3.1.1+~3.0.5-1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.0.4+~3.0.3-1
3.0.4+~3.0.5-1
3.1.1+~3.0.5-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "node-minimatch",
            "binary_version": "3.1.1+~3.0.5-1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-27903.json"
Ubuntu:24.04:LTS
node-minimatch

Package

Name
node-minimatch
Purl
pkg:deb/ubuntu/node-minimatch@9.0.3-4build5?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.1.1+~5.1.2-1
9.*
9.0.3-4build5

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "node-minimatch",
            "binary_version": "9.0.3-4build5"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-27903.json"
Ubuntu:25.10
node-minimatch

Package

Name
node-minimatch
Purl
pkg:deb/ubuntu/node-minimatch@9.0.3-6?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

9.*
9.0.3-5
9.0.3-6

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "node-minimatch",
            "binary_version": "9.0.3-6"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-27903.json"
Ubuntu:Pro:14.04:LTS
node-minimatch

Package

Name
node-minimatch
Purl
pkg:deb/ubuntu/node-minimatch@0.2.12-1ubuntu0.1~esm2?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.2.11-1
0.2.12-1
0.2.12-1ubuntu0.1~esm2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "node-minimatch",
            "binary_version": "0.2.12-1ubuntu0.1~esm2"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-27903.json"
Ubuntu:Pro:16.04:LTS
node-minimatch

Package

Name
node-minimatch
Purl
pkg:deb/ubuntu/node-minimatch@1.0.0-1ubuntu0.1~esm2?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.0.0-1
1.0.0-1ubuntu0.1~esm2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "node-minimatch",
            "binary_version": "1.0.0-1ubuntu0.1~esm2"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-27903.json"