IBM Support

Release of Guardium Data Protection security patch 11.0p6509

Release Notes


Abstract

This technical note provides guidance for installing IBM Security Guardium Data Protection patch 11.0p6509, including any new features or enhancements, resolved or known issues, or notices associated with the patch.

Content

Patch information
  • Patch file name: SqlGuard-11.0p6509.tgz.enc.sig
  • MD5 checksum: 7410f502d9a9b83f5205cc2916ebc966
Finding the patch 
Make the following selections to locate this patch for downlaod on the IBM Fix Central website:
 
  • Product selector: IBM Security Guardium
  • Installed version: 11.0
  • Platform: All
  • Click "Continue," select "Browse for fixes," and click "Continue" again.
  • Select "Appliance patch (GPU and ad hoc)" and enter the patch information in the "Filter fix details" field to locate the patch
For information about Guardium patch types and naming conventions, see the Understanding Guardium patch types and patch names support document.
Prerequisites
  • Guardium 11.0p545
Installation
Notes:
  • This patch is a designated security patch.
  • This patch restarts the Guardium system.
  • Do not reboot the appliance while the patch install is in progress. Contact Guardium support if there is an issue with patch installation.
Overview:
  1. Download the patch and extract the compressed package outside the Guardium system.
  2. Be sure to check the latest version of these patch release notes online just before you install this patch.
  3. Pick a "quiet" or low-traffic time  to install the patch on the Guardium system.
  4. Apply the latest health check patch.
  5. Install patches in a top-down manner on all Guardium systems: start with the central manager, then aggregators, then the collectors.
For information about installing Guardium Data protection patches, see How to install patches in the Guardium documentation.
Security fixes
This patch contains the following security fixes:
Issue key Summary CVEs
GRD-76934 SE - Pen Testing On Prem - October 2023 - Components have known vulnerabilities with proof of concept exploits - platform --
GRD-82306 PSIRT: PVR0507058 zlib-v1.2.12 (publicly disclosed vulnerability found by Mend) CVE-2022-37434
GRD-82996 PSIRT: PVR0510300 - bcprov-jdk15on-1.56.jar (publicly disclosed vulnerability found by Mend) - webapps, gimserver --
GRD-83492 PSIRT: PVR0506186, PVR0510604, PVR0510640, PVR0510586, PVR0510622 - [All] GNU glibc - CVE-2024-2961, CVE-2024-33599 (publicly disclosed vulnerability)
CVE-2024-2961
CVE-2024-33599
CVE-2024-33600
CVE-2024-33601
CVE-2024-33602
GRD-84093 PSIRT: PVR0412772 - Grub2 upgrade needed CVE-2022-2601
GRD-84116 PSIRT: PVR0498203 and PVR0498442 - ZooKeeper - Kafka
CVE-2017-5637
CVE-2018-8012
CVE-2019-0201
CVE-2023-44981
CVE-2024-23944
GRD-84339 PSIRT: PVR0461564 - [All] Python (publicly disclosed vulnerability) CVE-2023-40217
GRD-85072 botan-1.10.5-01.el7.x86_64 rpm has vulnerabilities CVE-2015-5726
CVE-2015-5727
CVE-2015-7824
CVE-2015-7825
CVE-2015-7826
CVE-2015-7827
CVE-2016-2194
CVE-2016-2195
CVE-2016-6878
CVE-2016-9132
GRD-86029 S-TAP status page is empty for Universal Connector configurations, although traffic is captured --

[{"Type":"MASTER","Line of Business":{"code":"LOB24","label":"Security Software"},"Business Unit":{"code":"BU048","label":"IBM Software"},"Product":{"code":"SSMPHH","label":"IBM Security Guardium"},"ARM Category":[{"code":"a8m3p000000PCTuAAO","label":"Platform\/Installation\/Deployment"}],"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"All Versions"}]

Document Information

Modified date:
28 August 2024

UID

ibm17166049