Skip to content

Commit

Permalink
Edits
Browse files Browse the repository at this point in the history
  • Loading branch information
nastasha-solomon committed Feb 27, 2025
1 parent 8e84eab commit 47093fa
Showing 1 changed file with 6 additions and 8 deletions.
14 changes: 6 additions & 8 deletions docs/release-notes/8.17.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -28,15 +28,13 @@ On November 12, 2024, it was discovered that manually running a custom query rul
[discrete]
[[bug-fixes-8.17.3]]
==== Bug fixes
* Disables sorting IP ranges in value list modal ({kibana-pull}210922[#210922]).
* Fixes generated names for integration title ({kibana-pull}210916[#210916]).
* Fixes package name validation on Datastream page ({kibana-pull}210770[#210770]).
* Handle empty categorization results from LLM ({kibana-pull}210420[#210420]).
* Added concurrency limits and request throttling to prebuilt rule routes ({kibana-pull}209551[#209551]).
* Only show data warning screen on Serverless ({kibana-pull}201920[#201920]).
* Removes the option to sort IP ranges in the value list modal ({kibana-pull}210922[#210922]).
* Fixes package name validation on the Automatic Import data stream page ({kibana-pull}210916[#210916], {kibana-pull}210770[#210770]).
* Improves the way Automatic Import handles empty categorization results from LLMs ({kibana-pull}210420[#210420]).
* Adds concurrency limits and request throttling to prebuilt rule routes ({kibana-pull}209551[#209551]).
* Fixes a Linux endpoint bug where tty capture limit defaults were ignored.
* Fixes a potential Elastic Defend crash when generating multiple ransomware alerts on Windows. This issue was simultaneously mitigated via a cloud artifact update (manifest version 1.0.1381) on 2025-02-24. Internet-connected instances of Defend will automatically receive this update - no user intervention required. Air-gapped customers hosting their own artifacts should follow [these instructions](https://www.elastic.co/guide/en/security/current/offline-endpoint.html). We would like to acknowledge [Todyl](https://www.todyl.com) for their assistance with this issue.
* The `allocate_shellcode` API behavior was updated to explicitly only apply to Unbacked memory.
* Fixes a potential {elastic-defend} crash when generating multiple ransomware alerts on Windows. This issue was simultaneously mitigated by a cloud artifact update (manifest version 1.0.1381) on February 24, 2025. Internet-connected instances of {elastic-defend} will automatically receive this update -- no user intervention required. Air-gapped customers hosting their own artifacts should follow [these instructions](offline-endpoint). We would like to acknowledge [Todyl](https://www.todyl.com) for their assistance with this issue.
* The `allocate_shellcode` API behavior was updated to explicitly only apply to unbacked memory.

[discrete]
[[release-notes-8.17.2]]
Expand Down

0 comments on commit 47093fa

Please # to comment.