IBM Support

Release of Guardium Data Protection patch 12.0p15

Release Notes


Abstract

This technical note provides guidance for installing IBM Security Guardium Data Protection patch 12.0p15, including any new features or enhancements, resolved or known issues, or notices associated with the patch.

Content

Patch information
  • Patch file name: SqlGuard-12.0p15_Bundle_Apr_23_2024.tgz.enc.sig
  • MD5 checksum: fa7134a9759d00dd67ff75fe1d812b74
 
Finding the patch 
Make the following selections to locate this patch for download on the IBM Fix Central website:
 
  • Product selector: IBM Security Guardium
  • Installed version: 12.0
  • Platform: All
  • Click "Continue," select "Browse for fixes," and click "Continue" again.
  • Select "Appliance patch (GPU and ad hoc)" and enter the patch information in the "Filter fix details" field to locate the patch.
For information about Guardium patch types and naming conventions, see the Understanding Guardium patch types and patch names support document.
 
 
Prerequisites
  • The latest health check patch 12.0p9997
 
Installation
Notes:
  • This patch is an appliance bundle that includes all fixes for 12.0 except sniffer fixes.
  • This patch restarts the Guardium system.
  • Do not reboot the appliance while the patch install is in progress. Contact Guardium support if there is an issue with patch installation.
  • When changing the password of CLI and guardcli users in the Guardium command line interface, a password strength warning appears even when strong passwords are not enabled. To remove the strong password checks, execute the CLI command store user strong_password disable.
Overview:
  1. Download the patch and extract the compressed package outside the Guardium system.
  2. Pick a "quiet" or low-traffic time  to install the patch on the Guardium system.
  3. Apply the latest health check patch.
  4. Install patches in a top-down manner on all Guardium systems: start with the central manager, then aggregators, then the collectors.
  5. Apply the latest quarterly DPS patch and rapid response DPS patch even if these patches were applied before the upgrade.
For information about installing Guardium Data protection patches, see How to install patches in the Guardium documentation.
 
 
Attention
Guardium GIM SHA128 certificates expire in May 2024
Guardium GIM SHA128 certificates are set to expire in May 2024. If the certificates are not renewed by the expiration date, GIM client-server communication will be affected. 
 
Please note that data monitoring activity through S-TAP or Universal Connector will not be disrupted.
 
Remediation:
  • To renew GIM server (appliance) certificates, install Guardium patch 12.0p10 or later.
  • After patch installation, allow a few hours for automatic distribution of the renewed GIM certificates to execute on the agents.  Check status using the “GIM Certificate Deployment Status” report.
For more information about the certificate distribution mechanism, see: https://www.ibm.com/docs/en/guardium/12.0?topic=management-creating-managing-custom-gim-certificates
 
Refer to the following Flash alert for more information: https://www.ibm.com/support/pages/node/7115129
 
 

Guardium sniffer certification expires on 3 March 2025

The current sniffer default certificate will expire on 3 March 2025 and you must install a Guardium appliance patch to renew the certificate. For Guardium 12.0 systems, appliance bundle patch 12.0p15 or later provides an updated certificate. For more information, see IBM Guardium sniffer certification expires March 2025.
 
 
Microsoft certificates expire on May 20, 2024
Microsoft certificates (microsoftca1-4) expire on May 20, 2024.  The following Guardium patches provide updated certificates:
  • 11.3 systems use patch 11.0p392 or later
  • 11.4 systems use patch 11.0p485 or later
  • 11.5 systems use patch 11.0p535 or later
  • 12.0 systems use patch 12.0p5 or later
Install the correct patch for your Guardium systems to use the updated certificates.  For more information, see https://www.ibm.com/support/pages/node/7080145
 
 
Enhancements
This patch includes the following enhancements:
 
Issue keySummary
GRD-80768Add Label action parameter to action Ignore Request
GRD-80119Add verification algorithm to SERVER DATA and STATEMENT in SLP
GRD-79058Universal Connector support is required for OCI - Autonomous Databases
GRD-78976DPS 2024 Q1
GRD-78598Upgrade or older sniffer patch should not convert tables from InnoDB back to MyISAM
GRD-78400Remove option for customers to create new MyISAM CUSTOM tables
GRD-78055Include all Custom Tables, Custom Domains, and Custom Queries when Exporting a Complete GDP Policy
GRD-76441Adv Stap Verify: Support MS SQL Cluster
GRD-76186Possibility to set flag STAP_GLOBAL_KEY by update GLOBAL_SESSION_KEY configuration parameter using GuardApi command and STAP Control.
GRD-75165Adv Stap Verify: Improve error messages - Could not reach S-TAP Host n.n.n.n
GRD-75105VA Performance Enhancement development phase 1
GRD-73114GDP : Custom datamarts execution modes during streaming configuration
GRD-70440Custom email template for Audit process alerts
GRD-69928Performance enhancement between Central Manager and Managed Units for VA
GRD-67083Enhanced S-TAP Verification including IE Verification Status with other fixes and scenario handling
GRD-65057Investigation spike: Support for Namespaces with Hashicorp Vault integration
GRD-64146Provide alert/notification about status (different than success) of classification
 
 
Resolved issues
This patch resolves the following issues:
 
Patch Issue keySummaryAPAR
12.0p10 This patch includes resolved issues from 12.0p10 (see release notes) 
12.0p15GRD-80720M7 appliances reboot constantly following p6003DT365699
 GRD-80246SMTP configuration Authentication error mails in WAIT statusDT378190
 GRD-80064[GDP][Cosan] - Regex'es missing from Session Policies after patch aplication (p535)DT364427
 GRD-79754During Restore from Backup v10.6 to v11.5 Guardium tries to read the archive through an incorrect port (and does not allow modification)DT276383
 GRD-78855Backup restore didn't restore the SAML and CyberArk configuration from v11.5 to v12DT276401
 GRD-78817In v12.0 TLS 1.0 and 1.1 are enabled and cannot be disabledDT276324
 GRD-78795Guardium 12.0 cause backup issue with AIX backup serverDT258902
 GRD-78775v12 grdapi update_assessment_test bugDT277154
 GRD-78417Archive fails after deleting scplog.log using diag utilityDT259993
 GRD-78416Increase mysql-error.log history and include all in must gather--
 GRD-78382Enable port 8444 to be disabled even if GIM clients are registered--
 GRD-78308v12 failed at post install action - Migrator checkDT276355
 GRD-78031Unit Utilization is very highDT276388
 GRD-77659Include GIM_SYSTEM_MODULES in deploy_agent Must Gather--
 GRD-77615Deployment Health Table - disk space status does not get reset after a disk full condition has been resolvedDT259580
 GRD-77581enabled auto_install_on_db_server_os_upgrade=1 S-TAP not runningDT276403
 GRD-77579Resource deployment on Central Manager doesn't show all MongoDB servers (Monitored by UC)DT276393
 GRD-77523Aliasing is not working for Health Deployment tableGA18499
 GRD-77441Importing WIN GIM/STAP Bundles Resulted in "Unexpected error ocurred. Please contact the system administrator during import"DT276407
 GRD-77411CVE- Scan Results for oracle 19.17. 0.0.0 VersionDT257073
 GRD-77003Archive failing with Error:1815; Message:Internal error: Failed to generate partition syntax,MESSAGE_TEXTDT277206
 GRD-76970TSM Vulnerability MitigationDT258503
 GRD-76913Error in disabling custom Java ciphersDT270396
 GRD-76624V11.5 Clicking "Search Users" button in "Audit Process To-Do List" Page Always Returned ErrorGA18482
 GRD-76021Ciphers re-enabled after installing V11 P530GA18483
 GRD-76012Adv Stap Verify:  java.net.UnknownHostException: <string>: Name or service not knownDT259362
 GRD-75831Account lockout configuration is getting reset to default after every GPU patch installationDT259386
 GRD-75781Adv Stap Verify: "handshake failed": unable to find valid certification path to requested targetDT259356
 GRD-74765java.lang.ArrayIndexOutOfBoundsException error when classification is run on some tablesDT270218
 GRD-74216Sniffer Crashing - Session inference queryDT259811
 GRD-74093Snowflake VA report run long time and eventually time outDT270085
 GRD-72998Qualys Reports Vulnerability on Guardium port 3129DT259327
 GRD-72735V11.3 upgrade to V11.5: Issue to send reports under SNMP message type after applied patches P520/P4057.DT270196
 GRD-71384Adv Stap Verify:  java.lang.Exception: Too Many records returnedDT259358
 GRD-70966Aggregator Query PerformanceDT276414
 GRD-65026After cli password expires when changing to new password guardium cli forces to change the password twice instead of onceGA18118
 
 
Known limitations
This patch contains the following known limitations:
Issue keySummary
GRD-82833Do not install this patch if you're using GCP, OCI, Azure. The fixes for these users will be delivered through a separate patch. AWS is not affected. 
GRD-80777
To use Azure Mysql Universal connector plugin you need to upload the plugin before you configure the connection.
GRD-81400
If customer has cloudwatch_logs Universal connector plugin configured to work with "role_arn" then user needs to upload "offline-logstash-input-cloudwatch_log_1_0_5.zip", follow relevant README for more details.
 
 
Security fixes
This patch contains the following security fixes:
PatchIssue keySummaryCVE
12.0p6005 This patch includes fixes from 12.0p6005 and all previous ones (see release notes) 
12.0p15GRD-79312PSIRT: PVR0468086, PVR0472300,PVR0480239, PVR0473509-- kernel upgrade requiredCVE-2023-5345, CVE-2023-5633,
CVE-2023-1192,
CVE-2023-6679
 GRD-79308PSIRT: PVR0484990,PVR0476693,PVR0484985 -- Gnu GnuTLS upgrade requiredCVE-2024-0553,
CVE-2024-0567,
CVE-2023-5981
 GRD-79284PSIRT: PVR0466432 - [All] kernel - CVE-2023-42753 (Publicly disclosed vulnerability) CVE-2023-42753
 GRD-78874PSIRT: PVR0482970, PVR0470863, PVR0470250 - Multiple RPM updates needed for vulnerable components - 11.x and 12.0CVE-2023-6377,
CVE-2023-5367,
CVE-2023-6478,
CVE-2022-3550,
CVE-2022-4283,
CVE-2022-46340,
CVE-2022-46341,
CVE-2022-46342,
CVE-2022-46343,
CVE-2022-46344,
CVE-2023-0494,
CVE-2023-1393,
CVE-2023-46847,
CVE-2020-22218,
CVE-2023-34058,
CVE-2023-34059,
CVE-2023-3611,
CVE-2023-3776,
CVE-2023-4206,
CVE-2023-4207,
CVE-2023-4208
 GRD-78257PSIRT: PVR0475474 - [All] PostgreSQL - CVE-2023-5869 (Publicly disclosed vulnerability) CVE-2023-5869
 GRD-78200PSIRT: PVR0475474, PVR0475502, PVR0475446 - [All] PostgreSQL - CVE-2023-5869 (Publicly disclosed vulnerability) CVE-2023-5869, CVE-2023-5870, CVE-2023-5868
 GRD-77917PSIRT: PVR0477215, PVR0476180 - reactor-netty-1.0.24.jar (Publicly disclosed vulnerability found by Mend) - datastreams
CVE-2023-34054,
CVE-2023-34062
 GRD-77429PSIRT: PVR0476700, PVR0476723 - IBM Security Guardium is vulnerable to multiple vulnerabilities in open-vm-tools component
CVE-2023-34059,
CVE-2023-34058
 GRD-77311PSIRT: PVR0476001 - IBM Security Guardium is vulnerable to a Out of Bounds vulnerabilityCVE-2023-5367
 GRD-77266PSIRT: PVR0475695- IBM SDK, Java Technology Edition Quarterly CPU - Oct 2023
CVE-2023-22081,
CVE-2023-22067,
CVE-2023-5676,
CVE-2023-22025
 GRD-76927PSIRT: PVR0474271 - SE - Pen Testing On-prem - October, 2023 - GIM module upload functionality can be used to upload any fileCVE-2023-47711
 GRD-76918PSIRT: PVR0474272 - SE - Pen Testing On-prem - October, 2023 - Privilege escalation from tomcat to root (server_receiver.pl)CVE-2023-47712
 GRD-76398Upgrade of BigFix client needed for appliances
CVE-2022-22576,
CVE-2022-27544,
CVE-2022-27545,
CVE-2022-27775,
CVE-2022-27776
 GRD-76367PSIRT: PVR0468745 - http2-common-9.4.44.v20210927.jar (Publicly disclosed vulnerability found by Mend) - datastreamsCVE-2023-44487
 

[{"Type":"MASTER","Line of Business":{"code":"LOB76","label":"Data Platform"},"Business Unit":{"code":"BU048","label":"IBM Software"},"Product":{"code":"SSMPHH","label":"IBM Security Guardium"},"ARM Category":[{"code":"a8m3p000000PCTuAAO","label":"Platform\/Installation\/Deployment"}],"ARM Case Number":"","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"12.0.0"}]

Document Information

Modified date:
12 September 2025

UID

ibm17149993