IBM Support

Release of Guardium Data Protection patch 12.0p31

Release Notes


Abstract

This technical note provides guidance for installing IBM Guardium Data Protection patch 12.0p31, including any new features or enhancements, resolved or known issues, or notices associated with the patch.

Content

Patch information
  • Patch file name: SqlGuard-12.0p31.tgz.enc.sig
  • MD5 checksum: 856de3f80a04347e37b4f1d836621042
Finding the patch 
Make the following selections to locate this patch for download on the IBM Fix Central website:
 
  • Product selector: IBM Security Guardium
  • Installed version: 12.0
  • Platform: All
Click Continue.
 
On the "Identify fixes" page, select Browse for fixes and click Continue.
 
On the "Select fixes" page, select Appliance Patch (GPU and Ad-Hoc). Then, enter the patch information in the Filter fix details field to locate the patch.
For information about Guardium patch types and naming conventions, see the Understanding Guardium patch types and patch names support document.
Prerequisites
Guardium Data Protection patch 12.0p30 (see release note).
Installation
Notes:
  • This patch restarts the Guardium system.
  • Do not reboot the appliance while the patch install is in progress. Contact IBM Support if there is an issue with patch installation.
  • When changing the password of CLI and guardcli users in the Guardium command line interface, a password strength warning appears even when strong passwords are not enabled. To remove the strong password checks, execute the CLI command store user strong_password disable.
Overview:
  1. Download the patch and extract the compressed package outside the Guardium system.
  2. Review the latest version of the patch release notes just before you install the patch.
  3. Pick a "quiet" or low-traffic time  to install the patch on the Guardium system.
  4. Apply the latest health check patch.
  5. Install patches in a top-down manner on all Guardium systems: start with the central manager, then aggregators, then the collectors.
  6. Apply the latest quarterly DPS patch and rapid response DPS patch even if these patches were applied before the upgrade.
For information about installing Guardium Data protection patches, see How to install patches in the Guardium documentation.
Security fixes
This patch resolves the following issues:
Issue key Summary CVE
GRD-89640
Multiple kernel vulnerabilities for RHEL9. PSIRT: PVR0487545, PVR0487589, PVR0487600, PVR0488067, PVR0488111, PVR0488144, PVR0493101, PVR0493131, PVR0493191, PVR0493926, PVR0493956, PVR0494016, PVR0494056, PVR0494066, PVR0494106, PVR0494136, PVR0494156, PVR0494784, PVR0495229, PVR0496124, PVR0496341, PVR0496371, PVR0496421, PVR0498916, PVR0499550, PVR0499560, PVR0499701, PVR0499711, PVR0499731, PVR0499741, PVR0500003, PVR0501585, PVR0501595, PVR0501605, PVR0503605, PVR0503806, PVR0504363, PVR0504393, PVR0513763, PVR0514044, PVR0514054, PVR0514074, PVR0514084, PVR0514094, PVR0514104, PVR0514124, PVR0514134, PVR0515178, PVR0515752, PVR0515762, PVR0515822, PVR0515852, PVR0515892, PVR0516417, PVR0516427, PVR0516447, PVR0516881, PVR0516931, PVR0516951, PVR0516961, PVR0526181, PVR0526201, PVR0526221, PVR0526241, PVR0526261, PVR0536501, PVR0536509, PVR0536535, PVR0536555, PVR0536575, PVR0536611, PVR0536651, PVR0536727, PVR0536745, PVR0536771, PVR0536789, PVR0536807, PVR0536827, PVR0536847, PVR0536895, PVR0536915, PVR0536923, PVR0536961, PVR0536979, PVR0536989, PVR0537025, PVR0537033, PVR0537123, PVR0537141, PVR0537151, PVR0537161, PVR0537169, PVR0537233, PVR0537260, PVR0537270, PVR0537278, PVR0537354, PVR0537364, PVR0537420, PVR0537428, PVR0537458, PVR0537506, PVR0537514, PVR0537554, PVR0537602, PVR0537612, PVR0537630, PVR0537656, PVR0537666, PVR0537719, PVR0537729, PVR0537739, PVR0537749, PVR0537853, PVR0537909, PVR0537917, PVR0537943, PVR0537953, PVR0537973, PVR0537983, PVR0538019, PVR0539466, PVR0539509, PVR0539750, PVR0540378, PVR0540865, PVR0540895, PVR0541666, PVR0541897, PVR0541957, PVR0542678, PVR0542728, PVR0542748, PVR0546227, PVR0546267, PVR0546701, PVR0547158, PVR0554807, PVR0554859, PVR0554901, PVR0554928, PVR0554993, PVR0555002, PVR0555029, PVR0555062, PVR0555809, PVR0555818, PVR0556636, PVR0560886, PVR0561049, PVR0561768, PVR0563606, PVR0564748, PVR0566524, PVR0566545, PVR0566565, PVR0566625, PVR0570511,
CVE-2021-47419, CVE-2021-47432, CVE-2021-47440, CVE-2021-47476, CVE-2021-47556, CVE-2023-52439, CVE-2023-52445, CVE-2023-52455, CVE-2023-52462, CVE-2023-52464, CVE-2023-52466, CVE-2023-52467, CVE-2023-52473, CVE-2023-52475, CVE-2023-52477, CVE-2023-52482, CVE-2023-52490, CVE-2023-52492, CVE-2023-52518, CVE-2023-52529, CVE-2023-52576, CVE-2023-52614, CVE-2023-52615, CVE-2023-52622, CVE-2023-52626, CVE-2023-52643, CVE-2023-52648, CVE-2023-52658, CVE-2023-52662, CVE-2023-52667, CVE-2023-52679, CVE-2023-52756, CVE-2023-52762, CVE-2023-52775, CVE-2023-52784, CVE-2023-52791, CVE-2023-52834, CVE-2024-0841, CVE-2024-22099, CVE-2024-23307, CVE-2024-23848, CVE-2024-24857, CVE-2024-24858, CVE-2024-25739, CVE-2024-26581, CVE-2024-26589, CVE-2024-26591, CVE-2024-26593, CVE-2024-26600, CVE-2024-26603, CVE-2024-26605, CVE-2024-26609, CVE-2024-26612, CVE-2024-26614, CVE-2024-26618, CVE-2024-26627, CVE-2024-26629, CVE-2024-26631, CVE-2024-26633, CVE-2024-26638, CVE-2024-26640, CVE-2024-26641, CVE-2024-26645, CVE-2024-26646, CVE-2024-26650, CVE-2024-26660, CVE-2024-26669, CVE-2024-26670, CVE-2024-26671, CVE-2024-26686, CVE-2024-26708, CVE-2024-26717, CVE-2024-26719, CVE-2024-26725, CVE-2024-26735, CVE-2024-26740, CVE-2024-26746, CVE-2024-26759, CVE-2024-26772, CVE-2024-26772, CVE-2024-26782, CVE-2024-26785, CVE-2024-26786, CVE-2024-26789, CVE-2024-26799, CVE-2024-26803, CVE-2024-26837, CVE-2024-26840, CVE-2024-26843, CVE-2024-26857, CVE-2024-26861, CVE-2024-26878, CVE-2024-26880, CVE-2024-26886, CVE-2024-26889, CVE-2024-26897, CVE-2024-26900, CVE-2024-26903, CVE-2024-26907, CVE-2024-26921, CVE-2024-26924, CVE-2024-26925, CVE-2024-26960, CVE-2024-26984, CVE-2024-27012, CVE-2024-27015, CVE-2024-27017, CVE-2024-27049, CVE-2024-27062, CVE-2024-27072, CVE-2024-27079, CVE-2024-27395, CVE-2024-27410, CVE-2024-27437, CVE-2024-31076, CVE-2024-34030, CVE-2024-35801, CVE-2024-35807, CVE-2024-35810, CVE-2024-35814, CVE-2024-35824, CVE-2024-35835, CVE-2024-35838, CVE-2024-35839, CVE-2024-35847, CVE-2024-35853, CVE-2024-35854, CVE-2024-35855, CVE-2024-35861, CVE-2024-35862, CVE-2024-35863, CVE-2024-35864, CVE-2024-35865, CVE-2024-35866, CVE-2024-35867, CVE-2024-35869, CVE-2024-35880, CVE-2024-35888, CVE-2024-35894, CVE-2024-35900, CVE-2024-35912, CVE-2024-35924, CVE-2024-35925, CVE-2024-35930, CVE-2024-35938, CVE-2024-35939, CVE-2024-35946, CVE-2024-35952, CVE-2024-35962, CVE-2024-35970, CVE-2024-35989, CVE-2024-36003, CVE-2024-36015, CVE-2024-36882, CVE-2024-36884, CVE-2024-36889, CVE-2024-36930, CVE-2024-36977, CVE-2024-38540, CVE-2024-38550, CVE-2024-38565, CVE-2024-38586, CVE-2024-38601, CVE-2024-38608, CVE-2024-39492, CVE-2024-39503, CVE-2024-40961, CVE-2024-40984, CVE-2024-41012, CVE-2024-41020, CVE-2024-41058, CVE-2024-41066, CVE-2024-41071, CVE-2024-41092, CVE-2024-41093, CVE-2024-42079, CVE-2024-42090, CVE-2024-42268, CVE-2024-42271, CVE-2024-42272, CVE-2024-42272, CVE-2024-42276, CVE-2024-42283, CVE-2024-42284, CVE-2024-42301, CVE-2024-43817, CVE-2024-43856, CVE-2024-43865, CVE-2024-43870, CVE-2024-43888, CVE-2024-44989, CVE-2024-45018

[{"Type":"MASTER","Line of Business":{"code":"LOB24","label":"Security Software"},"Business Unit":{"code":"BU048","label":"IBM Software"},"Product":{"code":"SSMPHH","label":"IBM Security Guardium"},"ARM Category":[{"code":"a8m3p000000PCTuAAO","label":"Platform\/Installation\/Deployment"}],"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"12.0.0"}]

Document Information

Modified date:
13 January 2025

UID

ibm17180581