Releases: himmelblau-idm/himmelblau
0.8.6
What's Changed
- Fix libutf8proc dependency issue on Ubuntu 22.04 - stable-0.8.x by @dmulder in #349
- Fix GOA crash when krb5.conf doesn't include /etc/krb5.conf.d - Stable 0.8.x by @dmulder in #354
- Only the himmelblau-sso package should conflict with intune-portal by @dmulder in #364
Full Changelog: 0.8.3...0.8.6
0.8.3
Impact
Two vulnerabilities were identified in Himmelblau versions 0.7.0 through 0.8.2:
- Logon Compliance Script Issue: When debug logging is enabled, user access tokens are inadvertently logged, potentially exposing sensitive authentication data.
- Kerberos CCache Issue: Similarly, Kerberos Ticket-Granting Tickets (TGTs) are logged when debug logging is enabled.
Both issues pose a risk of exposing sensitive credentials, particularly in environments where debug logging is enabled. Both issues are caused by the same underlying issue, and are resolve with a single patch.
Patches
The vulnerabilities have been addressed in Himmelblau version 0.8.3. All users are strongly encouraged to update to this version.
Workarounds
Users unable to update immediately can apply the following mitigations:
-
For the logon compliance script issue, disable the
logon_script
option in/etc/himmelblau/himmelblau.conf
:logon_script =
Ensure the
debug
option in the same configuration file is set tofalse
:debug = false
Additionally, avoid using the
-d
flag when starting thehimmelblaud
daemon. -
For the Kerberos CCache issue, disable debug logging globally by:
- Setting the
debug
option in/etc/himmelblau/himmelblau.conf
tofalse
. - Avoiding the
-d
parameter when startinghimmelblaud
.
- Setting the
References
- Himmelblau Configuration Documentation
- himmelblau.conf man page
- Himmelblau Daemon man page
- Official Himmelblau Release Notes and Updates
Package filtering
To download the latest packages for your distro, you can filter them here.
0.7.15
Impact
A vulnerability was identified in Himmelblau versions 0.7.0 through 0.8.2:
- Logon Compliance Script Issue: When debug logging is enabled, user access tokens are inadvertently logged, potentially exposing sensitive authentication data.
The issue poses a risk of exposing sensitive credentials, particularly in environments where debug logging is enabled.
Patches
The vulnerability has been addressed in Himmelblau version 0.7.15. All users are strongly encouraged to update to this version.
Workarounds
Users unable to update immediately can apply the following mitigations:
- For the logon compliance script issue, disable the
logon_script
option in/etc/himmelblau/himmelblau.conf
:Ensure thelogon_script =
debug
option in the same configuration file is set tofalse
:Additionally, avoid using thedebug = false
-d
flag when starting thehimmelblaud
daemon.
References
0.8.2
0.8.1
0.8.0
0.7.14
0.7.12
0.7.9
0.7.7
What's Changed
- Remove the org.samba.himmelblau dbus service by @dmulder in #302
- Enable module for utf8proc-devel in Rocky8 by @dmulder in #303
- Fix CVE-2024-11738: rustls network-reachable panic in
Acceptor::accept
by @dmulder in #307
This version addresses a vulnerability described in GHSA-8339-5m7v-j33j
Full Changelog: 0.7.4...0.7.7