Skip to content

Commit 321011f

Browse files
8.15.5 release notes (#6223)
* First draft * Minor editorial fixes * Styling fixes
1 parent 7b12be4 commit 321011f

File tree

2 files changed

+19
-2
lines changed

2 files changed

+19
-2
lines changed

docs/release-notes.asciidoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@ This section summarizes the changes in each release.
55

66
* <<release-notes-8.16.1, {elastic-sec} version 8.16.1>>
77
* <<release-notes-8.16.0, {elastic-sec} version 8.16.0>>
8+
* <<release-notes-8.15.5, {elastic-sec} version 8.15.5>>
89
* <<release-notes-8.15.4, {elastic-sec} version 8.15.4>>
910
* <<release-notes-8.15.3, {elastic-sec} version 8.15.3>>
1011
* <<release-notes-8.15.2, {elastic-sec} version 8.15.2>>

docs/release-notes/8.15.asciidoc

Lines changed: 18 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,22 @@
11
[[release-notes-header-8.15.0]]
22
== 8.15
33

4+
[discrete]
5+
[[release-notes-8.15.5]]
6+
=== 8.15.5
7+
8+
[discrete]
9+
[[bug-fixes-8.15.5]]
10+
==== Bug fixes
11+
* Ensures that only the asset criticality index is refreshed after you bulk upload asset criticality data ({kibana-pull}200897[#200897]).
12+
* Fixes {agent} to {elastic-defend} communication on endpoints using a proxy. With this fix, localhost TCP traffic should skip any proxies.
13+
* Fixes a time skew bug that occurs when Linux virtual machines that are using eBPF event probes are suspended and then resumed.
14+
* Fixes an {elastic-defend} bug where Windows API events might be dropped if they contain Unicode characters that can’t be converted to ANSI.
15+
* Fixes a bug where {elastic-defend} could fail to properly enrich Windows API events for short-lived processes on older operating systems that don’t natively include this telemetry, such as Windows Server 2019. This might result in dropped or unattributed API events.
16+
* Ensures that {elastic-defend} does not emit an empty `memory_region` if it can’t enrich a memory region in an API event. With this fix, {elastic-defend} removes these fields.
17+
* Enhances {elastic-defend} by improving the `call_stack_final_user_module` attribution where potential `proxy_call` modules are encountered during Windows call stack analysis.
18+
19+
420
[discrete]
521
[[release-notes-8.15.4]]
622
=== 8.15.4
@@ -200,6 +216,7 @@ On October 17, 2024, this issue was resolved.
200216
* Fixes an {elastic-defend} regression that was introduced in 8.14.0, where security events did not populate the `user.name` field. This fix is for Windows endpoints only.
201217
* Fixes an {elastic-defend} bug where {elastic-endpoint} sometimes missed file and network events on newer kernels that support eBPF. This only occurred if {elastic-endpoint} failed to enable eBPF probes and fell back to Kprobes. This fix is for Linux endpoints only.
202218
* Fixes a bug that caused errors if you used Azure OpenAI connector for streaming ({kibana-pull}191552[#191552]).
219+
* Fixes a bug that caused Elastic AI Assistant's responses to sometimes include tags when using Bedrock Sonnet 3.5.
203220
* Fixes a bug that prevented duplicated prebuilt rules from inheriting **Required fields** and **Related integrations** field values ({kibana-pull}191065[#191065]).
204221
* Turns off the option to assign users to an alert if no assignees exist ({kibana-pull}190937[#190937]).
205222
* Fixes a bug that prevented Timeline template settings from being applied to new Timelines that were generated by a rule ({kibana-pull}190511[#190511]).
@@ -222,7 +239,6 @@ On October 17, 2024, this issue was resolved.
222239
*Details* +
223240
On August 1, 2024, it was discovered that Elastic AI Assistant's responses when using Bedrock Sonnet 3.5 may include `<antThinking>` tags, for example `<search_quality_reflection>` ({kibana-issue}189676[#189676]).
224241
225-
226242
====
227243
// end::known-issue-189676[]
228244

@@ -269,7 +285,7 @@ On September 5, 2024, this issue was resolved.
269285
A bug prevented third-party response actions with CrowdStrike from working.
270286
271287
*Workaround* +
272-
Upgrade to 8.15.1 or later.
288+
Upgrade to 8.15.1.
273289
274290
====
275291
// end::known-issue-crowdstrike-response-actions[]

0 commit comments

Comments
 (0)