Releases: activecm/BeaKer
Releases · activecm/BeaKer
v0.0.14
What's Changed
- Update README.md with details on initializing git submodules by @Zalgo2462 in #62
- Upgrade ELK stack to v8.x by @caffeinatedpixel in #75
- Update shell-lib (docker compose @v2) by @caffeinatedpixel in #76
- Use Ubuntu 20 for the Github runner by @Zalgo2462 in #77
- Fix sudo -E error in generate_installer.sh when running as root by @Zalgo2462 in #78
- Don't use sudo when calling install_docker.sh by @Zalgo2462 in #79
- Give all users read/write permissions for snapshots directory by @caffeinatedpixel in #81
- Move snapshot directory to /var/BeaKer/snapshots by @caffeinatedpixel in #83
Full Changelog: v0.0.13...v0.0.14
v0.0.13
- Fix X509_V_FLAG_CB_ISSUER_CHECK error when installing docker-compose: activecm/shell-lib#29
- Fix RHEL 7.9 installation: activecm/shell-lib#27
- Enable RHEL 8 compatible installations: activecm/shell-lib#30
v0.0.12
v0.0.11
v0.0.10
Changes:
- Upgrade Elasticsearch to 7.16.1, patching an exploit in the log4j logger which may lead to information disclosure
For more information, please see https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476
From the elastic report:
Elasticsearch is not susceptible to remote code execution with this vulnerability due to our use of the Java Security Manager. Elasticsearch on JDK8 or below is susceptible to an information leak via DNS