Skip to content

Commit bf4cc7b

Browse files
authored
Merge pull request #15386 from Security-Onion-Solutions/patch/2.4.201
2.4.201
2 parents 8ff0c68 + c63c6dc commit bf4cc7b

File tree

4 files changed

+25
-12
lines changed

4 files changed

+25
-12
lines changed

DOWNLOAD_AND_VERIFY_ISO.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
1-
### 2.4.200-20251216 ISO image released on 2025/12/16
1+
### 2.4.201-20260114 ISO image released on 2026/1/15
22

33

44
### Download and Verify
55

6-
2.4.200-20251216 ISO image:
7-
https://download.securityonion.net/file/securityonion/securityonion-2.4.200-20251216.iso
6+
2.4.201-20260114 ISO image:
7+
https://download.securityonion.net/file/securityonion/securityonion-2.4.201-20260114.iso
88

9-
MD5: 07B38499952D1F2FD7B5AF10096D0043
10-
SHA1: 7F3A26839CA3CAEC2D90BB73D229D55E04C7D370
11-
SHA256: 8D3AC735873A2EA8527E16A6A08C34BD5018CBC0925AC4096E15A0C99F591D5F
9+
MD5: 20E926E433203798512EF46E590C89B9
10+
SHA1: 779E4084A3E1A209B494493B8F5658508B6014FA
11+
SHA256: 3D10E7C885AEC5C5D4F4E50F9644FF9728E8C0A2E36EBB8C96B32569685A7C40
1212

1313
Signature for ISO image:
14-
https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.200-20251216.iso.sig
14+
https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.201-20260114.iso.sig
1515

1616
Signing key:
1717
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.4/main/KEYS
@@ -25,22 +25,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.
2525

2626
Download the signature file for the ISO:
2727
```
28-
wget https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.200-20251216.iso.sig
28+
wget https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.201-20260114.iso.sig
2929
```
3030

3131
Download the ISO image:
3232
```
33-
wget https://download.securityonion.net/file/securityonion/securityonion-2.4.200-20251216.iso
33+
wget https://download.securityonion.net/file/securityonion/securityonion-2.4.201-20260114.iso
3434
```
3535

3636
Verify the downloaded ISO image using the signature file:
3737
```
38-
gpg --verify securityonion-2.4.200-20251216.iso.sig securityonion-2.4.200-20251216.iso
38+
gpg --verify securityonion-2.4.201-20260114.iso.sig securityonion-2.4.201-20260114.iso
3939
```
4040

4141
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
4242
```
43-
gpg: Signature made Mon 15 Dec 2025 05:24:11 PM EST using RSA key ID FE507013
43+
gpg: Signature made Wed 14 Jan 2026 05:23:39 PM EST using RSA key ID FE507013
4444
gpg: Good signature from "Security Onion Solutions, LLC <info@securityonionsolutions.com>"
4545
gpg: WARNING: This key is not certified with a trusted signature!
4646
gpg: There is no indication that the signature belongs to the owner.

VERSION

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
2.4.200
1+
2.4.201

salt/manager/tools/sbin/soup

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -427,6 +427,7 @@ preupgrade_changes() {
427427
[[ "$INSTALLEDVERSION" == 2.4.170 ]] && up_to_2.4.180
428428
[[ "$INSTALLEDVERSION" == 2.4.180 ]] && up_to_2.4.190
429429
[[ "$INSTALLEDVERSION" == 2.4.190 ]] && up_to_2.4.200
430+
[[ "$INSTALLEDVERSION" == 2.4.200 ]] && up_to_2.4.201
430431
true
431432
}
432433

@@ -459,6 +460,7 @@ postupgrade_changes() {
459460
[[ "$POSTVERSION" == 2.4.170 ]] && post_to_2.4.180
460461
[[ "$POSTVERSION" == 2.4.180 ]] && post_to_2.4.190
461462
[[ "$POSTVERSION" == 2.4.190 ]] && post_to_2.4.200
463+
[[ "$POSTVERSION" == 2.4.200 ]] && post_to_2.4.201
462464
true
463465
}
464466

@@ -645,6 +647,11 @@ post_to_2.4.200() {
645647
POSTVERSION=2.4.200
646648
}
647649

650+
post_to_2.4.201() {
651+
echo "Nothing to apply"
652+
POSTVERSION=2.4.201
653+
}
654+
648655
repo_sync() {
649656
echo "Sync the local repo."
650657
su socore -c '/usr/sbin/so-repo-sync' || fail "Unable to complete so-repo-sync."
@@ -1317,6 +1324,12 @@ so-yaml.py removelistitem /etc/salt/master file_roots.base /opt/so/rules/nids
13171324

13181325
}
13191326

1327+
up_to_2.4.201() {
1328+
echo "Nothing to do for 2.4.201"
1329+
1330+
INSTALLEDVERSION=2.4.201
1331+
}
1332+
13201333
determine_elastic_agent_upgrade() {
13211334
if [[ $is_airgap -eq 0 ]]; then
13221335
update_elastic_agent_airgap
566 Bytes
Binary file not shown.

0 commit comments

Comments
 (0)