IBM Support

Release of the QRadar V7.3.2 Patch 5 SFS (7.3.2.20191022133252)

Release Notes


Abstract

This technical note contains installation instructions, and a list of new features and resolved issues for the IBM Security QRadar V7.3.2 Patch 5 (7.3.2.20191022133252) SFS. These instructions are intended for administrators who are upgrading from QRadar V7.3.0, V7.3.1, or V7.3.2 to QRadar V7.3.2 Patch 5 using an SFS file.

Content

Known Issues

The QRadar DNS Analyzer app V1.4.2 or earlier is not compatible with QRadar 7.3.2 Patch 5.
Known issues in QRadar 7.3.2 Patch 5
Product Component Number Description
QRADAR SEARCHES IJ21718 ARIEL SEARCHES FAIL AND EVENTS ARE NOT PROCESSED/WRITTEN TO DISK WHEN A CONCURRENTMODIFICATIONEXCEPTION OCCURS

Resolved Issues

Due to an issue in QRadar V7.3.0 and V7.3.1, the diskmaintd.pl script did not remove files from the /storetmp directory. This issue is resolved in QRadar V7.3.2. For more information, see QRadar: Files in /storetmp get deleted daily in 7.3.2 .

Some APAR links in the following table might take 24 hours to display properly after a software release is posted to IBM Fix Central.

tr>
Resolved issues in QRadar 7.3.2 Patch 5
Product Component Number Description
QRADAR SECURITY BULLETIN CVE-2019-4509 IBM QRadar SIEM is vulnerable to incorrect authorization in some components
QRADAR SECURITY BULLETIN CVE-2019-9500 IBM QRadar SIEM is vulnerable to multiple Kernel vulnerabilities
QRADAR SECURITY BULLETIN CVE-2017-7656 IBM QRadar SIEM is vulnerable to Jetty Vulnerabilities
QRADAR SECURITY BULLETIN CVE-2019-4454 IBM QRadar SIEM is vulnerable to cross site scripting (XSS)
QRADAR SECURITY BULLETIN CVE-2019-4470 IBM QRadar SIEM is vulnerable to cross site scripting (XSS)
QRADAR SECURITY BULLETIN CVE-2019-4581 IBM QRadar SIEM is vulnerable to cross site scripting (XSS)/td>
QRADAR SECURITY BULLETIN CVE-2019-10088 Apache Tika as used by IBM QRadar SIEM is vulnerable to denial of service/td>
QRADAR SECURITY BULLETIN CVE-2018-12126 IBM QRadar SIEM is vulnerable to Intel Microarchitectural Data Sampling (MDS) Vulnerabilites
QRADAR SECURITY BULLETIN CVE-2019-10173 XStream as used by IBM QRadar SIEM is vulnerable to OS command injection
QRADAR REPORTS IJ18488 REPORT DOES NOT CHART THE TOP 5 DESTINATION PORTS FOR TIME VS COUNT
QRADAR MANAGED HOSTS IJ10406 ATTEMPTING TO RE-ADD A MANAGED HOST (MH) THAT ORIGINALLY FAILED TO ADD DUE TO TIMEOUT CAN LEAVE THE MH IN A STUCK STATE
QRADAR APPLICATION FRAMEWORK IJ20143 DOCKER IPTABLES CAN GROW UNEXPECTEDLY IN SIZE WHEN APPS ARE INSTALLED/MIGRATED/REMOVED CAUSING DEPLOYS TO FAIL
QRADAR UPGRADE / PRETEST IJ16960 THE QRADAR PATCH PRETEST FAILS WHEN A BACKUP IS IN 'MISSING' STATE IN THE DATABASE
QRADAR UPGRADE / INSTALL IJ16041 QRADAR INSTALLATION HANGS WHEN USING COMPRESSED IPV6 ADDRESS
QRADAR GEOGRAPHIC DATA IJ11947 GEOGRAPHIC LOCATION IS USING IPV4 ADDRESS WHEN CONFIGURED IN RULES INSTEAD OF THE IPV6 ADDRESS
QRADAR HIGH AVAILABILITY (HA) / PORT SCAN IJ14440 'EXCEPTION NOT HANDLED. UNDEFINED BEHAVIOR' MESSAGE IN LOGGING ON QRADAR HIGH AVAILABILITY APPLIANCES
QRADAR RULES / LOG SOURCE IJ15665 DEVICE (+TYPE +GROUP) STOPPED SENDING EVENTS RULE TEST IS NO LONGER FIRING THE PROPER 'DEVICE STOPPED SENDING EVENTS' EVENT
QRADAR OFFENSES / DOMAIN MANAGEMENT IJ16738 USERS ASSIGNED TO A DOMAIN DO NOT HAVE ACCESS TO OFFENSES WHERE THE TARGET IS FROM THE NETWORK "OTHER"
QRADAR VULNERABILITY MANAGER SCAN PROFILE IJ17416 SCAN PROFILES WHICH USE PUBLIC KEY AUTHENTICATION DO NOT WORK CORRECTLY AFTER UPGRADING TO QRADAR VULNERABILITY MANAGER (QVM) 7.3.2
QRADAR DEPLOY CHANGES IJ18582 'UNABLE TO DEPLOY CHANGES, COULD NOT RETRIEVE UNDEPLOYED CHANGE LIST -- THE REQUEST TIMED OUT.
QRADAR RULES / OFFENSES IJ17323 SOURCE IP OR DESTINATION IP FILTER IS NOT AN AVAILABLE TEST OPTION FOR 'COMMON' RULES
QRADAR REPORTS IJ17229 SHORT REPORTS CONFIGURED WITH LINE OR BAR CHARTS CAN FAIL TO GENERATE WITH AN SQL EXCEPTION WRITTEN TO QRADAR LOGGING
QRADAR REPORTS IJ17199 REPORT Y-AXIS VALUE PLOTTED CAN BE PULLED FROM DIFFERENT COLUMN THAN WHAT WAS CONFIGURED FOR THE REPORT
QRADAR LOG MESSAGES IJ15784 'NO JESSIONID PASSED WITH COOKIE' MESSAGES IN QRADAR LOGS

What's new

For information on what's new in QRadar V7.3.2, see the following information: https://www.ibm.com/support/knowledgecenter/SS42VS_7.3.2/com.ibm.qradar.doc/c_qradar_ov_whats_new_732.html

Upgrade information

QRadar V7.3.2 Patch 5 resolves reported issues from users and administrators from previous QRadar versions. This cumulative software update fixes known software issues in your QRadar deployment. QRadar software updates are installed by using an SFS file, and updates all appliances attached to the QRadar Console.

The 7.3.2-QRADAR-QRSIEM-20191022133252 SFS file can upgrade QRadar V7.3.0, V7.3.1, or V7.3.2 to QRadar V7.3.2 Patch 4. However, this document does not cover all of the installation messages and requirements, such as changes to appliance memory requirements or browser requirements for QRadar. To review any additional requirements, see the QRadar Upgrade Guide .

See Preparing for the upgrade for a list of steps to review before updating your QRadar deployment.

Before you begin

Ensure that you take the following precautions:

  • Back up your data before you begin any software upgrade. For more information about backup and recovery, see the QRadar Administration Guide .
  • To avoid access errors in your log file, close all open QRadar sessions.
  • The QRadar software update cannot be installed on a managed host that is at a different software version from the Console. All appliances in the deployment must be at the same software revision to update the entire deployment.
  • Verify that all changes are deployed on your appliances. The update cannot install on appliances that have changes that are not deployed.
  • If this is a new installation, review the instructions in the QRadar Installation Guide .

Azure Marketplace Images

There is an issue related to incorrect hostnames in QRadar 7.3.1.4 Azure Marketplace images. To resolve, follow this procedure before you upgrade to QRadar V7.3.2 Patch 5:
  1. Download the hostname helper script.
    • If you are installing a Console, download the Console script from Fix Central.
    • If you are installing a managed host, download the managed host script from Fix Central.
  2. Upload the script to your virtual appliance.
  3. To change the file permissions on the script, type the following command.
    • For a Console:
      • sudo chmod +x 7.3.1.4_Azure_marketplace_Image_Console.sh
    • For a managed host:
      • sudo chmod +x 7.3.1.4_Azure_marketplace_image_managedhost.sh
  4. To run the script, type the following command.
    • For a Console:
      • sudo ./7.3.1.4_Azure_marketplace_Image_Console.sh
    • For a managed host:
      • sudo ./7.3.1.4_Azure_marketplace_image_managedhost.sh

Installing the QRadar V7.3.2 Patch 5 Software Update

These instructions guide you through the process of upgrading an existing QRadar version at V7.3.0, V7.3.1, or V7.3.2 to QRadar V7.3.2 Patch 5. To update appliances in parallel, see: QRadar: How to Update Appliances in Parallel .

IMPORTANT: QRadar V7.3.2 Patch 5 includes stricter rules for Ariel queries to address APAR IJ13437. You must run the aqlValidator script to determine if any Ariel queries must be updated before you upgrade to QRadar V7.3.2 Patch 5. For more information about the aqlValidator script, see APAR IJ13446 .

If you have auto updates enabled, type the following command to run aqlValidator:

/opt/qradar/support/apar/aqlValidator

If you don't have auto updates enabled:

  1. Download the latest auto updates bundle from the IBM Fix Central website.
  2. To install the auto updates bundle, follow the instructions in QRadar: How to Manually Install the QRadar Weekly Auto Update Bundle .
  3. Type the following command to run aqlValidator:
    /opt/qradar/support/apar/aqlValidator

Procedure

  1. Download the software update to install QRadar V7.3.2 Patch 5 from the IBM Fix Central website: http://www.ibm.com/support/fixcentral/swg/quickorder?parent=IBM%20Security&product=ibm/Other+software/IBM+Security+QRadar+SIEM&release=All&platform=All&function=fixId&fixids=7.3.2-QRADAR-QRSIEM-20191022133252&includeSupersedes=0&source=fc
  2. Use SSH to log in to your Console as the root user.
  3. To verify you have enough space (5GB) in /store/tmp for the QRadar Console, type the following command:
    df -h /tmp /storetmp /store/transient | tee diskchecks.txt
    • Best directory option: /storetmp

      It is available on all appliance types at all versions. In QRadar V7.3.0 versions /store/tmp is a symlink to the /storetmp partition.

    • 2nd best directory option: /tmp

      This directory is available on all appliances, but in V7.3.0 the version is significantly smaller and moving a file here can cause services to stop. If you leave a file in /tmp for 10 days without completing the SFS update, it might get cleaned up by Red Hat's tmpwatch cron job.

    • 3rd best option: /store/transient

      The store/transient directory was introduced in QRadar V7.2.1 and is allocated 10% of the overall /store directory. However, this directory does not exist on all appliances, such as QFlow or QRadar Network Insights and might not be an actual partition on all appliances.

      If the disk check command fails, retype the quotation marks from your terminal, then re-run the command. This command returns the details to both the command window and to a file on the Console named diskchecks.txt. Review this file to ensure that all appliances have at minimum 5GB of space available in a directory to copy the SFS before attempting to move the file to a managed host. If required, free up disk space on any host that fails to have less that 5GB available.

      Note: In QRadar V7.3.0 and later, an update to directory structure for STIG compliant directories reduces the size of several partitions. This can impact moving large files to QRadar.

  4. To create the /media/updates directory, type the following command:
    mkdir -p /media/updates
  5. Using SCP, copy the files to the QRadar Console to the /storetmp directory or a location with 5GB of disk space.
  6. Change to the directory where you copied the patch file. For example,
    cd /storetmp
  7. To mount the patch file to the /media/updates directory, type the following command:
    mount -o loop -t squashfs /storetmp/732_QRadar_patchupdate-7.3.2.20191022133252.sfs /media/updates
  8. To run the patch installer, type the following command:
    /media/updates/installer 

    Note: The first time that you run the software update, there might be a delay before the software update installation menu is displayed.

  9. Using the patch installer, select all.
    • The all option updates the software on all appliances in the following order:
      1. Console
      2. No order required for remaining appliances. All remaining appliances can be updated in any order that you require.
    • If you do not select the all option, you must select your Console appliance.

      As of QRadar V7.2.6 Patch 4 and later, you are only provided the option to update all or update the Console appliance. Managed hosts are not displayed in the installation menu to ensure that the Console is patched first. After the Console is patched, a list of managed hosts that can be updated is displayed in the installation menu. This change was made starting with QRadar V7.2.6 Patch 4 to ensure that the Console appliance is always updated before managed hosts to prevent upgrade issues.

      If you want to patch systems in series, you can update the Console first, then copy the patch to all other appliances and run the patch installer individually on each managed host. The Console must be patched before you can run the installer on managed hosts. When updating in parallel, there is no order required in how you update appliances after the Console is updated.

      If your Secure Shell (SSH) session is disconnected while the upgrade is in progress, the upgrade continues. When you reopen your SSH session and rerun the installer, the patch installation resumes.

Installation wrap-up

  1. After the patch completes and you have exited the installer, type the following command:
    umount /media/updates
  2. Clear your browser cache before you log in to the Console.

Results

A summary of the software update installation advises you of any managed hosts that were not updated. If the software update fails to update a managed host, you can copy the software update to the host and run the installation locally.

After all hosts are updated, send an email to your team to inform them that they will need to clear their browser cache before they log in to the QRadar SIEM interface.

Where do I find more information?

[{"Product":{"code":"SSBQAC","label":"IBM QRadar SIEM"},"Business Unit":{"code":"BU008","label":"Security"},"Component":"Release Notes","Platform":[{"code":"PF016","label":"Linux"}],"Version":"7.3","Edition":"All Editions"}]

Document Information

Modified date:
01 April 2020

UID

ibm11097439