Release Notes
Abstract
This technical note provides guidance for installing IBM Guardium Data Protection patch 11.0p6409, including any new features or enhancements, resolved or known issues, or notices associated with the patch.
Content
Patch information
- Patch file name: SqlGuard-11.0p6409.tgz.enc.sig
- MD5 checksum: e550b13362399554b1d5d739f557df03
Finding the patch
Make the following selections to locate this patch for downlaod on the IBM Fix Central website:
Make the following selections to locate this patch for downlaod on the IBM Fix Central website:
- Product selector: IBM Guardium
- Installed version: 11.0
- Platform: All
- Click "Continue," select "Browse for fixes," and click "Continue" again.
- Select "Appliance patch (GPU and ad hoc)" and enter the patch information in the "Filter fix details" field to locate the patch
For information about Guardium patch types and naming conventions, see the Understanding Guardium patch types and patch names support document.
Prerequisites
Guardium 11.0p491 (see the 11.0p491 release notes for more information)
Installation
Notes:
- This patch is a designated security patch.
- This patch restarts the Guardium system.
- Do not reboot the appliance while the patch install is in progress. Contact IBM Support if there is an issue with patch installation.
Overview:
- Download the patch and extract the compressed package outside the Guardium system.
- Be sure to check the latest version of these patch release notes online just before you install this patch.
- Pick a "quiet" or low-traffic time to install the patch on the Guardium system.
- Apply the latest health check patch.
- Install patches in a top-down manner on all Guardium systems: start with the central manager, then aggregators, then the collectors.
For information about installing Guardium Data protection patches, see How to install patches in the Guardium documentation.
Security fixes
This patch contains the following security fixes:
| Issue key | Summary | CVEs |
|---|---|---|
| GRD-76934 | SE - Pen Testing On Prem - October 2023 - Components have known vulnerabilities with proof of concept exploits - platform | -- |
| GRD-82306 | PSIRT: PVR0507058 zlib-v1.2.12 (publicly disclosed vulnerability found by Mend) | CVE-2022-37434 |
|
GRD-82618
|
PSIRT: PVR0486479, PVR0483335 OpenSSL (publicly disclosed vulnerability)
|
CVE-2023-6129
CVE-2024-0727
|
| GRD-82996 | PSIRT: PVR0510300 - bcprov-jdk15on-1.56.jar (publicly disclosed vulnerability found by Mend) - webapps, gimserver | -- |
| GRD-83492 | PSIRT: PVR0506186, PVR0510604, PVR0510640, PVR0510586, PVR0510622 - [All] GNU glibc - CVE-2024-2961, CVE-2024-33599 (publicly disclosed vulnerability) |
CVE-2024-2961
CVE-2024-33599
CVE-2024-33600
CVE-2024-33601
CVE-2024-33602
|
|
GRD-83567
|
PSIRT: PVR0497727, PVR0497754: [All] Apache Tomcat (core only) update in version 12
|
CVE-2024-23672
CVE-2024-24549
|
| GRD-84093 | PSIRT: PVR0412772 - Grub2 upgrade needed | CVE-2022-2601 |
| GRD-84116 | PSIRT: PVR0498203 and PVR0498442 - ZooKeeper - Kafka |
CVE-2017-5637
CVE-2018-8012
CVE-2019-0201
CVE-2023-44981
CVE-2024-23944
|
| GRD-84339 | PSIRT: PVR0461564 - [All] Python (publicly disclosed vulnerability) | CVE-2023-40217 |
| GRD-85072 | botan-1.10.5-01.el7.x86_64 rpm has vulnerabilities | CVE-2015-5726 CVE-2015-5727 CVE-2015-7824 CVE-2015-7825 CVE-2015-7826 CVE-2015-7827 CVE-2016-2194 CVE-2016-2195 CVE-2016-6878 CVE-2016-9132 |
[{"Type":"MASTER","Line of Business":{"code":"LOB24","label":"Security Software"},"Business Unit":{"code":"BU048","label":"IBM Software"},"Product":{"code":"SSMPHH","label":"IBM Security Guardium"},"ARM Category":[{"code":"a8m3p000000PCTuAAO","label":"Platform\/Installation\/Deployment"}],"ARM Case Number":"","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"11.4.0"}]
Was this topic helpful?
Document Information
Modified date:
07 October 2024
UID
ibm17171823