UBUNTU-CVE-2026-23901

Source
https://ubuntu.com/security/CVE-2026-23901
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-23901.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2026-23901
Upstream
Published
2026-02-10T10:15:00Z
Modified
2026-02-17T21:17:15.349153Z
Severity
  • 1.0 (Low) CVSS_V4 - CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/S:N/AU:Y/R:A/V:C/RE:L/U:Green CVSS Calculator
  • 2.5 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

Observable Timing Discrepancy vulnerability in Apache Shiro. This issue affects Apache Shiro: from 1., 2. before 2.0.7. Users are recommended to upgrade to version 2.0.7 or later, which fixes the issue. Prior to Shiro 2.0.7, code paths for non-existent vs. existing users are different enough, that a brute-force attack may be able to tell, by timing the requests only, determine if the request failed because of a non-existent user vs. wrong password. The most likely attack vector is a local attack only. Shiro security model https://shiro.apache.org/security-model.html#username_enumeration  discusses this as well. Typically, brute force attack can be mitigated at the infrastructure level.

References

Affected packages

Ubuntu:20.04:LTS
shiro

Package

Name
shiro
Purl
pkg:deb/ubuntu/shiro@1.3.2-4ubuntu0.2?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.3.2-4
1.3.2-4ubuntu0.1
1.3.2-4ubuntu0.2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libshiro-java",
            "binary_version": "1.3.2-4ubuntu0.2"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-23901.json"
Ubuntu:22.04:LTS
shiro

Package

Name
shiro
Purl
pkg:deb/ubuntu/shiro@1.3.2-5?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.3.2-4
1.3.2-5

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libshiro-java",
            "binary_version": "1.3.2-5"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-23901.json"
Ubuntu:25.10
shiro

Package

Name
shiro
Purl
pkg:deb/ubuntu/shiro@1.3.2-6ubuntu1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.3.2-6ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libshiro-java",
            "binary_version": "1.3.2-6ubuntu1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-23901.json"
Ubuntu:Pro:16.04:LTS
shiro

Package

Name
shiro
Purl
pkg:deb/ubuntu/shiro@1.2.4-1ubuntu0.1~esm2?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.2.4-1
1.2.4-1ubuntu0.1~esm1
1.2.4-1ubuntu0.1~esm2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libshiro-java",
            "binary_version": "1.2.4-1ubuntu0.1~esm2"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-23901.json"
Ubuntu:Pro:18.04:LTS
shiro

Package

Name
shiro
Purl
pkg:deb/ubuntu/shiro@1.3.2-3ubuntu0.18.04.1~esm1?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.3.2-2
1.3.2-3~18.04
1.3.2-3~18.04.1
1.3.2-3ubuntu0.18.04.1~esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libshiro-java",
            "binary_version": "1.3.2-3ubuntu0.18.04.1~esm1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-23901.json"
Ubuntu:Pro:24.04:LTS
shiro

Package

Name
shiro
Purl
pkg:deb/ubuntu/shiro@1.3.2-5ubuntu0.24.04.1~esm1?arch=source&distro=esm-apps/noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.3.2-5
1.3.2-5ubuntu0.24.04.1~esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libshiro-java",
            "binary_version": "1.3.2-5ubuntu0.24.04.1~esm1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-23901.json"