Skip to content

Commit 691126c

Browse files
Lock versions for releases: 8.12,8.13,8.14,8.15,8.16,8.17 (#4295)
1 parent f0291b4 commit 691126c

File tree

2 files changed

+25
-5
lines changed

2 files changed

+25
-5
lines changed

detection_rules/etc/version.lock.json

Lines changed: 24 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2480,10 +2480,20 @@
24802480
"version": 6
24812481
},
24822482
"28eb3afe-131d-48b0-a8fc-9784f3d54f3c": {
2483+
"min_stack_version": "8.16",
2484+
"previous": {
2485+
"8.12": {
2486+
"max_allowable_version": 104,
2487+
"rule_name": "Privilege Escalation via SUID/SGID",
2488+
"sha256": "c4446351419a5cceb8e8748abd412e3ab49e52aa075b01c4df54b5a970d08403",
2489+
"type": "eql",
2490+
"version": 5
2491+
}
2492+
},
24832493
"rule_name": "Privilege Escalation via SUID/SGID",
24842494
"sha256": "3ad739db58620275cb4330a3cc329918aeae3bec457d3dff8ae127ef93ac05f7",
24852495
"type": "eql",
2486-
"version": 4
2496+
"version": 105
24872497
},
24882498
"28f6f34b-8e16-487a-b5fd-9d22eb903db8": {
24892499
"rule_name": "Shell Configuration Creation or Modification",
@@ -6034,9 +6044,9 @@
60346044
"696015ef-718e-40ff-ac4a-cc2ba88dbeeb": {
60356045
"min_stack_version": "8.13",
60366046
"rule_name": "AWS IAM User Created Access Keys For Another User",
6037-
"sha256": "0007bd73ca11b0b6f5300662fa4863050840bc67ef764048a14b63a4a6e1c038",
6047+
"sha256": "c0b79735104a736c418ffcbe21e0292334ad5d5ed9c425c75d5d0aaad52463f0",
60386048
"type": "esql",
6039-
"version": 4
6049+
"version": 5
60406050
},
60416051
"699e9fdb-b77c-4c01-995c-1c15019b9c43": {
60426052
"rule_name": "Deprecated - Threat Intel Filebeat Module (v8.x) Indicator Match",
@@ -14382,9 +14392,19 @@
1438214392
"version": 104
1438314393
},
1438414394
"ff9bc8b9-f03b-4283-be58-ee0a16f5a11b": {
14395+
"min_stack_version": "8.16",
14396+
"previous": {
14397+
"8.12": {
14398+
"max_allowable_version": 106,
14399+
"rule_name": "Potential Sudo Token Manipulation via Process Injection",
14400+
"sha256": "a7acb15e762a822b94eadf4a2caebe464a6f3cf2f67bfbcebcacba6c928d5366",
14401+
"type": "eql",
14402+
"version": 7
14403+
}
14404+
},
1438514405
"rule_name": "Potential Sudo Token Manipulation via Process Injection",
1438614406
"sha256": "d9a50180875a16c7d3cfedadf27a0c3bb75bd18b950d188993f9ba0f43f504ca",
1438714407
"type": "eql",
14388-
"version": 6
14408+
"version": 107
1438914409
}
1439014410
}

pyproject.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
[project]
22
name = "detection_rules"
3-
version = "0.3.2"
3+
version = "0.3.3"
44
description = "Detection Rules is the home for rules used by Elastic Security. This repository is used for the development, maintenance, testing, validation, and release of rules for Elastic Security’s Detection Engine."
55
readme = "README.md"
66
requires-python = ">=3.12"

0 commit comments

Comments
 (0)