Releases: himmelblau-idm/himmelblau
Releases · himmelblau-idm/himmelblau
0.7.15
Impact
A vulnerability was identified in Himmelblau versions 0.7.0 through 0.8.2:
- Logon Compliance Script Issue: When debug logging is enabled, user access tokens are inadvertently logged, potentially exposing sensitive authentication data.
The issue poses a risk of exposing sensitive credentials, particularly in environments where debug logging is enabled.
Patches
The vulnerability has been addressed in Himmelblau version 0.7.15. All users are strongly encouraged to update to this version.
Workarounds
Users unable to update immediately can apply the following mitigations:
- For the logon compliance script issue, disable the
logon_script
option in/etc/himmelblau/himmelblau.conf
:Ensure thelogon_script =
debug
option in the same configuration file is set tofalse
:Additionally, avoid using thedebug = false
-d
flag when starting thehimmelblaud
daemon.
References
0.8.2
0.8.1
0.8.0
0.7.14
0.7.12
0.7.9
0.7.7
What's Changed
- Remove the org.samba.himmelblau dbus service by @dmulder in #302
- Enable module for utf8proc-devel in Rocky8 by @dmulder in #303
- Fix CVE-2024-11738: rustls network-reachable panic in
Acceptor::accept
by @dmulder in #307
This version addresses a vulnerability described in GHSA-8339-5m7v-j33j
Full Changelog: 0.7.4...0.7.7
0.6.16
What's Changed
This version addresses a vulnerability described in GHSA-8339-5m7v-j33j
Full Changelog: 0.6.15...0.6.16