Release Notes
Abstract
This document lists the updates that have been done and are available for IBM Guardium Database Protection Service (DPS). DPS is a subscription service that provides periodic updates to vulnerability tests as well as other predefined content, including reports, groups, and policies.
Content
This document is intended for IBM Guardium Data Protection version 11.x and 12.x clients.
Requirements
|
Version
|
Requirements
|
|---|---|
|
11.x
|
There are no specific requirements for loading the quarterly DPS release on Guardium version 11.x.
|
|
12.x
|
There are no specific requirements for loading the quarterly DPS release on Guardium version 12.x.
|
Notes
To use the new MS-SQL Exclude Databases group to exclude databases from being scanned, apply SqlGuard-12.0p25_Bundle_Oct_10_2024.tgz.enc.sig (12.0)
To use the new Sybase ASE Hotfix numbering for version and patch, and for CVEs, apply the following bundles:
- SqlGuard-11.0p550_Bundle_Sep_28_2024.tgz.enc.sig (11.5)
- SqlGuard-12.0p20_Bundle_Jul_29_2024.tgz.enc.sig (12.0)
These features are included in the 12.1 release.
DPS files
| Version | Filename and MD5SUM |
|---|---|
| 11.x |
Filename: Guardium_V11_Quarterly_DPS_2024_Q4_20241115.enc
MD5SUM: a790d87f00501c305ceb868ddae44758
|
| 12.x |
Filename: Guardium_V12_Quarterly_DPS_2024_Q4_20241115.enc
MD5SUM: 115eb9093b43424e1866e990af4285de |
Updated database vendor version + patches
| Version 11.x | Version 12.x |
|---|---|
|
Microsoft SQL Server Database
16.0+4150
15.0+4395 14.0+3480 13.0+7045 MySql Database
9.1+0*
8.4+3* 8.0+40* Oracle Database
21+RU 21.16.0.0.241015
19+RU 19.25.0.0.241015 Sybase Database
16.0+04.06%HF1
15.7+EBF%SP141%HF2 Teradata PDE
17.20.03+30
Teradata TDBMS
17.20.03+30
Teradata TDGSS
17.20.03+30
Teradata TGTW
17.20.03+30
Postgres
12.20+0*
13.16+0* 14.13+0* 15.8+0* 16.4+0* 17.0+0* SybaseIQ Database
16.1+sp05.14
MongoDB Database
5.0+30
6.0+19 7.0+15 8.0+3 Cloudera Hadoop
7.1+7.p3014
7.1+8.p68 7.1+9.p1010 DataStax Cassandra DSE
5.1+46
6.8+51 6.9+3 DB2 LUW Database Special Security Fixes
11.5+8.0, special_37208, O
11.5+8.0, special_38086, O 11.5+8.0, special_40526, O 11.5+8.0, special_42458, O 11.5+8.0, special_43143, O 11.5+9.0, special_38308, O 11.5+9.0, special_39210, O 11.5+9.0, special_39340, O 11.5+9.0, special_40226, O 11.5+9.0, special_42449, O 11.5+9.0, special_43682, O 11.5+9.0, special_46591, O 11.5+9.0, special_47198, O 10.5+11, special_41496 11.1+7, special_41497 11.5+0.0, special_41498, O Couchbase
7.6+3
7.2+6 Neo4j
4.4+38
5.23+0 5.24+2 MariaDB
11.5+2
11.4+3 11.2+5 11.1+6 10.11+9 10.6+19 10.5+26 Percona MySQL
8.4+0
8.0+39 Apache Cassandra
5.0+2
4.1+7 4.0+14 |
Microsoft SQL Server Database
16.0+4150
15.0+4395 14.0+3480 13.0+7045 MySql Database
9.1+0*
8.4+3* 8.0+40* Oracle Database
21+RU 21.16.0.0.241015
19+RU 19.25.0.0.241015 Sybase Database
16.0+04.06%HF1
15.7+EBF%SP141%HF2 Teradata PDE
17.20.03+30
Teradata TDBMS
17.20.03+30
Teradata TDGSS
17.20.03+30
Teradata TGTW
17.20.03+30
Postgres
12.20+0*
13.16+0* 14.13+0* 15.8+0* 16.4+0* 17.0+0* SybaseIQ Database
16.1+sp05.14
MongoDB Database
5.0+30
6.0+19 7.0+15 8.0+3 Cloudera Hadoop
7.1+7.p3014
7.1+8.p68 7.1+9.p1010 DataStax Cassandra DSE
5.1+46
6.8+51 6.9+3 DB2 LUW Database Special Security Fixes
11.5+8.0, special_37208, O
11.5+8.0, special_38086, O 11.5+8.0, special_40526, O 11.5+8.0, special_42458, O 11.5+8.0, special_43143, O 11.5+9.0, special_38308, O 11.5+9.0, special_39210, O 11.5+9.0, special_39340, O 11.5+9.0, special_40226, O 11.5+9.0, special_42449, O 11.5+9.0, special_43682, O 11.5+9.0, special_46591, O 11.5+9.0, special_47198, O 10.5+11, special_41496 11.1+7, special_41497 11.5+0.0, special_41498, O Couchbase
7.6+3
7.2+6 Neo4j
4.4+38
5.23+0 5.24+2 MariaDB
11.5+2
11.4+3 11.2+5 11.1+6 10.11+9 10.6+19 10.5+26 Percona MySQL
8.4+0
8.0+39 Apache Cassandra
5.0+2
4.1+7 4.0+14 EDB Postgres
14.13+1*
15.8+1* 16.4+1* CockroachDB
23.2+13
24.1+6 24.2+4 |
VA test enhancements
| Versions | Test ID | Description | Database type | What changed? |
|---|---|---|---|---|
| 11.x, 12.x | -- | -- | -- | -- |
New VA tests
| Versions | Test ID | Description | Database type |
|---|---|---|---|
| 11.x, 12.x | -- | -- | -- |
Updated groups
| Versions | ID | Name type | New or updated items | What changed? |
|---|---|---|---|---|
| 11.x, 12.x | -- | -- | -- | -- |
Common vulnerabilities and exposures
| Versions | Test name | Database type | CVE score |
|---|---|---|---|
| 11.x, 12.x | CVE-2024-21233 | ORACLE | 4.3 |
| 11.x, 12.x | CVE-2024-21251 | ORACLE | 3.1 |
| 11.x, 12.x | CVE-2024-31882 | DB2 | 6.5 |
| 11.x, 12.x | CVE-2024-35136 | DB2 | 6.5 |
| 11.x, 12.x | CVE-2024-35152 | DB2 | 6.5 |
| 11.x, 12.x | CVE-2024-37529 | DB2 | 6.5 |
| 11.x, 12.x | CVE-2024-37337 | MS SQL SERVER | 4.3 |
| 11.x, 12.x | CVE-2024-37342 | MS SQL SERVER | 4.3 |
| 11.x, 12.x | CVE-2024-20996 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2024-21125 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2024-21127 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2024-21129 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2024-21130 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2024-21134 | MYSQL | 4.3 |
| 11.x, 12.x | CVE-2024-21135 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2024-21137 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2024-21142 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2024-21157 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2024-21159 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2024-21160 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2024-21162 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2024-21163 | MYSQL | 5.5 |
| 11.x, 12.x | CVE-2024-21165 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2024-21166 | MYSQL | 5.9 |
| 11.x, 12.x | CVE-2024-21171 | MYSQL | 6.5 |
| 11.x, 12.x | CVE-2024-21173 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2024-21193 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2024-21194 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2024-21196 | MYSQL | 6.5 |
| 11.x, 12.x | CVE-2024-21197 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2024-21198 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2024-21199 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2024-21200 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2024-21201 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2024-21203 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2024-21204 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2024-21207 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2024-21209 | MYSQL | 2 |
| 11.x, 12.x | CVE-2024-21212 | MYSQL | 4.4 |
| 11.x, 12.x | CVE-2024-21213 | MYSQL | 4.2 |
| 11.x, 12.x | CVE-2024-21218 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2024-21219 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2024-21230 | MYSQL | 6.5 |
| 11.x, 12.x | CVE-2024-21231 | MYSQL | 3.1 |
| 11.x, 12.x | CVE-2024-21232 | MYSQL | 2.2 |
| 11.x, 12.x | CVE-2024-21236 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2024-21237 | MYSQL | 2.2 |
| 11.x, 12.x | CVE-2024-21238 | MYSQL | 5.3 |
| 11.x, 12.x | CVE-2024-21239 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2024-21241 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2024-21243 | MYSQL | 2.2 |
| 11.x, 12.x | CVE-2024-21244 | MYSQL | 2.2 |
| 11.x, 12.x | CVE-2024-21247 | MYSQL | 3.8 |
| 11.x, 12.x | CVE-2024-6384 | MONGODB | 5.3 |
| 11.x, 12.x | CVE-2024-8207 | MONGODB | 6.7 |
| 11.x, 12.x | CVE-2024-25673 | COUCHBASE | 6.1 |
| 11.x, 12.x | CVE-2024-37034 | COUCHBASE | 5.9 |
| 11.x, 12.x | SIA-MVS-2024.08-2 | IBM DB2 Z/OS | N/A |
[{"Type":"MASTER","Line of Business":{"code":"LOB24","label":"Security Software"},"Business Unit":{"code":"BU048","label":"IBM Software"},"Product":{"code":"SSMPHH","label":"IBM Security Guardium"},"ARM Category":[{"code":"a8m3p000000PCTuAAO","label":"Platform\/Installation\/Deployment"}],"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"All Versions"}]
Was this topic helpful?
Document Information
Modified date:
15 November 2024
UID
ibm17175585