From: Tim Potter <tpot@hp.com>
Date: Mon Sep 1 17:16:52 2014 +1000
Subject: Fix CVE-2014-3120,
 elasticsearch: remote code execution flaw via dynamic scripting

---
 config/elasticsearch.yml | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/config/elasticsearch.yml b/config/elasticsearch.yml
index 51fcea4..c521649 100644
--- a/config/elasticsearch.yml
+++ b/config/elasticsearch.yml
@@ -23,6 +23,8 @@
 # For information on supported formats and syntax for the config file, see
 # <http://elasticsearch.org/guide/en/elasticsearch/reference/current/setup-configuration.html>
 
+# CVE-2014-3120: Disable dynamic scripting by default
+script.disable_dynamic: true
 
 ################################### Cluster ###################################
 
