Source: shiro Version: 1.3.2-5 Severity: important Tags: security upstream X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerability was published for shiro. CVE-2026-23901[0]: | Observable Timing Discrepancy vulnerability in Apache Shiro. This | issue affects Apache Shiro: from 1.*, 2.* before 2.0.7. Users are | recommended to upgrade to version 2.0.7 or later, which fixes the | issue. Prior to Shiro 2.0.7, code paths for non-existent vs. | existing users are different enough, that a brute-force attack may | be able to tell, by timing the requests only, determine if the | request failed because of a non-existent user vs. wrong password. | The most likely attack vector is a local attack only. Shiro security | model https://shiro.apache.org/security- | model.html#username_enumeration discusses this as well. Typically, | brute force attack can be mitigated at the infrastructure level. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2026-23901 https://www.cve.org/CVERecord?id=CVE-2026-23901 [1] https://www.openwall.com/lists/oss-security/2026/02/08/2 Please adjust the affected versions in the BTS as needed. Regards, Salvatore __ This is the maintainer address of Debian's Java team <https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-java-maintainers>. Please use [email protected] for discussions and questions.
