Release Notes
Abstract
This technical note provides guidance for installing IBM Guardium Data Protection patch 12.0p120, including any new features or enhancements, resolved or known issues, or notices associated with the patch.
Content
- Patch file name: SqlGuard-12.0p120_Bundle_May_28_2025.tgz.enc.sig
- MD5 checksum: bb4ea193b805e959d04451bf7d6b49e3
Finding the patch
- Select the following options to download this patch on the IBM Fix Central website and click Continue.
- Product selector: IBM Security Guardium
- Installed Version: 12.1
- Platform: All
- On the "Identify fixes" page, select Browse for fixes and click Continue.
- On the "Select fixes" page, select Appliance patch (GPU and Ad-Hoc). Then, enter the patch information in the Filter fix details field to locate the patch.
- Guardium Data Protection 12.1 (see release note)
- The latest Guardium Data Protection health check patch 12.0p9997
Installation
- This patch is an appliance bundle that includes fixes for 12.1.
- This patch is cumulative and includes all the fixes from previously released patches.
- This patch restarts the Guardium system.
- Do not reboot the appliance while the patch install is in progress. Contact IBM Support if there is an issue with patch installation.
- When changing the password of CLI and guardcli users in the Guardium command line interface, a password strength warning appears even when strong passwords are not enabled. To remove the strong password checks, execute the CLI command store user strong_password disable.
- Download the patch and extract the compressed package outside the Guardium system.
- Review the latest version of the patch release note just before you install the patch.
- Pick a "quiet" or low-traffic time to install the patch on the Guardium system.
- Apply the latest health check patch.
- Install patches in a top-down manner on all Guardium systems: start with the central manager, then aggregators, then the collectors.
- Apply the latest quarterly DPS patch and rapid response DPS patch.
Guardium patch signing certificate expired on 29 March 2025
In 12.0p115 (see release note), the IBM Db2 for z/OS JDBC driver in Guardium Vulnerability Assessment is updated to support IBM Db2 13 for z/OS, which enables TLS 1.3 and other advantages. You might need to update your IBM Db2 JDBC license. If so, test your connection in a staging environment and contact the IBM Db2 Support team if licensing issues arise. For assistance, open a case at ibm.com/mysupport.
| Issue key | Summary |
|---|---|
| GRD-82941 | Manage Apache Kafka clusters by using Cruise control |
| GRD-84183 | Support added for installing and uninstalling profiles to a managed unit group |
| GRD-86114 | Set maximum size for universal connector log file by using new grdapi set_uc_log_file_size uc_log_file_size command |
| GRD-86286 | Verified upload of custom tables for Amazon Redshift data source |
| GRD-86309 | Update SNMP and SMTP GuardAPI commands |
| GRD-86446 | Added support for creating a data source of Milvus Database type for an S-TAP Verification Application type |
| GRD-87158 | Ability to scan vulnerabilities in Couchbase Capella database |
| GRD-87161 | Ability to scan vulnerabilities in Amazon DocumentDB database |
| GRD-87165 | Ability to scan vulnerabilities in Amazon ElastiCache database |
| GRD-88705 | [Microsoft SQL Server] Improved the handling of unavailable database connections during classification scan |
| GRD-89094 | Fixed version check logic for Neo4j to correctly compare versions with decimals |
| GRD-89695 | Added entitlements for Yugabyte data source |
| GRD-90865 | Bulk configuration of data source profiles from central manager |
| GRD-90869 | Added support for Amazon DocumentDB data source |
| GRD-91366 | Backported entitlements for Yugabyte data source to version 12.1 |
| GRD-92070 | Connection to the data source happens automatically after rebooting the data source |
| GRD-92386 | When upgrading from Guardium version 11.5 to version 12.0, special characters are allowed in the password for SCP backup server |
| GRD-92522 | Download the profile template for a plug-in by using Download import profile template in the Guardium UI |
| GRD-92524 | Create or update multiple data source profiles in the Guardium UI by uploading CSV files from the Upload import file tab in the Create profile window |
| GRD-93932 | Install or uninstall data source profiles on the Guardium appliance by using the Run now option |
| GRD-93934 | Delete multiple data source profiles by using the Guardium UI |
| GRD-94307 | Add force option to CLI command replace certificate gim algorithm |
| GRD-94434 | Cleanup Kafka clusters by using grdapi delete_kafka_cluster clusterName="<cluster_name>" command |
| GRD-94556 | Change Manage > Universal Connector > Plugin Management to Manage > Universal Connector > Package Management |
| GRD-94622 | When you update a profile, the Name field is not editable |
| GRD-94703 | Removed old patch signing certificates from appliance and UI after March 2025 |
| GRD-94997 | Update Entrust Certificate Authority root certificate (entrust_g3) signature algorithm to SHA2 |
| GRD-95786 | Test connection for a “Ready profile" by using the Guardium UI and GuardAPI command |
| GRD-95942 | Change the maximum number of restarts for Kafka-connect |
| GRD-95943 | Add a Label column to group profiles in Datasource Profile Management |
| GRD-95967 | Create GuardAPI commands to download the template, upload CSV, and install, uninstall, and delete multiple profiles |
| GRD-96440 | Create grdapi universal_connector_export_profiles profileNames="<profile_name>l" command to export profiles and create a CSV file |
| GRD-96442 | Export profiles with the same connector type and create a CSV file by using the Guardium UI |
| GRD-96793 | Change the Kafka connect value.converter property with the protobuf converter |
| GRD-96803 | When you install a profile, create sink connector by using the Guardium UI |
| GRD-96855 | On the Datasource Profile Management page, view the progress of the test connection to the data source with the progress indicator in the Status column |
| GRD-96927 | Guardium UI changes on the Datasource Profile Management page |
| GRD-96934 | View the detailed health information about universal connectors by using View UC Health link on the Datasource Profile Management page |
| GRD-97589 | Allocate more resources to Kafka, Kafka connect, and Apache ZooKeeper processes |
| Patch | Issue key | Summary | Known issue (APAR) |
|---|---|---|---|
| 12.0p115 | This patch includes resolved issues from 12.0p115 (see release notes) | ||
| 12.0p120 | GRD-78772 | Guardium GUI certificate renewal error: guardium Venafi retrieve script error 80333 trying to import Venafi certificate | DT389660 |
| GRD-81983 | Aggregator GUI is slow and unresponsive | DT395091 | |
| GRD-84011 | Test collector stopped sending policy alerts to user facility | DT394214 | |
| GRD-84052 | rsyslog test fails intermittently and randomly | DT397061 | |
| GRD-84662 | When changing the password for the cli user after it has expired, the Guardium appliance forces to change the password twice instead of once | DT419649 | |
| GRD-85772 | Enterprise Load Balancer not relocating STAPs (Software TAPs) when collector database is getting full | DT419735 | |
| GRD-87129 | After configuring A-TAP on collector with Oracle Exadata databases, the collector reports a high CPU usage | DT420527 | |
| GRD-87135 | Unable to send files from Guardium to COS bucket on IBM Cloud | DT431894 | |
| GRD-87282 | EMEA - GUI showing SNMP version 2 but CLI and traffic in SNMP version 3 | DT400637 | |
| GRD-87529 | Add TUPLE_PARAMETERS table to translation | N/A | |
| GRD-87718 | GUI certificate size still running in 1024 bites in central manager | DT422234 | |
| GRD-88890 | Backup configuration through SFTP protocol failed with the error message: connection corrupted | DT426747 | |
| GRD-89081 | CLI command show port open scans for the open port instead of making an actual connection | N/A | |
| GRD-89153 | Schedule job exception: PEStatusJob trigger: siGroup.PEStatusJobError caught executing job due to some runtime exception | DT419637 | |
| GRD-89290 | support reset_managed_cli command does not set change for CLI user | DT409177 | |
| GRD-89562 | Inconsistent hostname in syslog message header for Guardium sniffer and audit process | DT423305 | |
| GRD-89704 | EMEA - aggregation/archive log warning - adm | DT420186 | |
| GRD-89881 | Guardium File Acitivty Monitoring (FAM) policy for adding another action cannot be saved | DT419254 | |
| GRD-89910 | Guardium 12.1 central manager still accepts TLS 1.0 and 1.1 connections | DT431893 | |
| GRD-90989 | EMEA - email not sent through SMTP | DT434614 | |
| GRD-91695 | Resolved security vulnerability | N/A | |
| GRD-91913 | In GIM Clients Status report, the GIM client install date is displayed in UTC timezone with the column header: GIM Client Install Date (UTC) | DT431919 | |
| GRD-92530 | Deployment Health Table / Dashboard on the central manager shows unavailable status (blue) for all managed units | DT425251 | |
| GRD-92686 | GuardAPI command to upload custom table is not working when using only data source group is attached to the custom table | DT431864 | |
| GRD-93189 | Unable to log in to the appliance after configuring multi-factor authentication for DUO on Guardium | DT422702 | |
| GRD-93684 | For grdapi change_cli_password command, the following error appears: User has insufficient privileges for the requested API function | DT431874 | |
| GRD-93729 | After the failover to the backup central manager, the managed units are unable to sync license | DT424816 | |
| GRD-94015 | Managed unit registration to the central manager does not succeed due to mismatch in the strength of the system shared secret | DT424713 | |
| GRD-94293 | EMEA - Syslog sending junk messages | DT434622 | |
| GRD-95201 | grdapi create_stap_inspection_engines command fails with duplicate message when there are no duplicates | N/A | |
| GRD-95306 | Solr certificate for version 11.5 expired on 12 January 2025 | DT436468 | |
| GRD-97506 | Azure data streams connection not working | DT436626 | |
| GRD-98054 | Fixed issue with dynamic tuple group when creating and editing session level policy | DT436686 | |
| GRD-98631 | EMEA - Syslog and SMTP alerts inactive after Guardium reboot | DT438058 |
| Patch | Issue key | Summary | CVE |
|---|---|---|---|
| 12.0p115 | This patch includes security fixes from 12.0p115 (see release notes) | ||
| 12.0p120 | GRD-91689 | PSIRT: PVR0586685 - SE - Pen Testing On-prem 2024 - Privilege escalation by SUID binary - multiple findings TZAVW-0008, TZAVW-0003, TZAVW-0006, TZAVW-0007, TZAVW-0013, TZAVW-0014 - 6.7 Medium - page 6-7 - Due 4/30/2025 | CVE-2025-25024 |
GRD-92006 | SE - Pen Testing On-prem 2024 - Extraneous information revealed in detailed error messages - TZAVW-0019 - 5.3 Medium - page 11 | CVE-2025-25028 | |
| GRD-92007 | PSIRT: PVR0586693 - SE - Pen Testing On-prem 2024 - Incorrect Authorization of Setup functions - TZAVW-0021 - 5.0 Medium - pages 11-12 11 | CVE-2025-25026 | |
| GRD-92008 | PSIRT: PVR0586689 - SE - Pen Testing On-prem 2024 - Download any file from server by backup/export function - TZAVW-0005 - 4.9 - Medium - page 14 | CVE-2025-25029 | |
| GRD-92009 | PSIRT: PVR0586686 - SE - Pen Testing On-prem 2024 - User information is available to all users - TZAVW-0012 - 4.3 Medium - pages 14-15 | CVE-2025-25025 | |
| GRD-92011 | PVR0586696 - SE - Pen Testing On-prem 2024 - Multiple data stream vulnerabilities - TZAVW-0018 - 9.8 - Critical - pages 16-18 | CVE-2025-25025, CVE-2015-1832, CVE-2024-45772, CVE-2023-22737, CVE-2021-47400, CVE-2022-31122, CVE-2023-33953, CVE-2018-1313, CVE-2024-45217, CVE-2024-3596 | |
| GRD-92031 | PSIRT: PVR0552042 - commons-io-2.11.0.jar (Publicly disclosed vulnerability found by Mend) - kafka | CVE-2024-47554 | |
| GRD-92032 | PSIRT: PVR0557444 - jetty-http-9.4.53.v20231009.jar (Publicly disclosed vulnerability found by Mend) - kafka | CVE-2024-6763 | |
| GRD-92040 | PSIRT: PVR0567482 - netty-common-4.1.108.Final.jar (Publicly disclosed vulnerability found by Mend) - kafka | CVE-2024-47535 | |
| GRD-92046 | PSIRT: PVR0568961 - Kafka - CVE-2024-31141 (Publicly disclosed vulnerability) - data streams | CVE-2024-31141 | |
| GRD-92047 | PSIRT: PVR0575094 - struts2-core-2.5.33.jar (Publicly disclosed vulnerability found by Mend) - webapps | CVE-2024-53677 | |
| GRD-93251 | PSIRT: PVR0586099 - cxf-core-3.5.6.jar (Publicly disclosed vulnerability found by Mend) | ||
GRD-93632 | PSIRT: PVR0562183 - MySQL Upgrade needed for October 2024 CPU | CVE-2024-21193, CVE-2024-21194, CVE-2024-21197, CVE-2024-21198, CVE-2024-21199, CVE-2024-21200, CVE-2024-21201, CVE-2024-21204, CVE-2024-21209, CVE-2024-21212, CVE-2024-21213, CVE-2024-21231, CVE-2024-21236, CVE-2024-21237, CVE-2024-21241, CVE-2024-21243, CVE-2024-21244, CVE-2024-21247, CVE-2024-21262, CVE-2024-21272 | |
| GRD-93688 | Tenable Scan - rsync rpm need to be installed latest in version 12 | CVE-2024-12085 | |
| GRD-94118 | Tenable Scan - krb5 rpm need to update | CVE-2024-3596 | |
| GRD-94137 | Tenable Scan - tuned rpm in version 12.x | CVE-2024-52337 | |
GRD-94326 | Tenable Scan - KERNEL need to be updated | CVE-2024-53088, CVE-2024-38598, CVE-2024-35927, CVE-2024-43879, CVE-2024-35898, CVE-2024-35913, CVE-2024-35973, CVE-2024-35824, CVE-2024-35809, CVE-2024-38562, CVE-2024-35859, CVE-2023-28746, CVE-2024-50256, CVE-2024-40907 | |
| GRD-94913 | PSIRT: PVR0595976, PVR0596141 - multiple netty vulnerabilities (Publicly disclosed vulnerability found by Mend) | CVE-2025-25193, CVE-2025-24970 | |
| GRD-95020 | Tenable Scan - glib2 rpm need to be updated | CVE-2024-34397 | |
GRD-95022 | Tenable Scan - podman and buildah rpm need to be updated | CVE-2024-9675, CVE-2024-9407, CVE-2024-9676 | |
GRD-95023 | Tenable Scan - microcode ctl | CVE-2023-46103, CVE-2023-38575, CVE-2023-45733, CVE-2023-22655, CVE-2023-28746, CVE-2023-43490, CVE-2023-39368, CVE-2023-46103, CVE-2023-38575, CVE-2023-45733, CVE-2023-22655 | |
| GRD-95024 | Tenable Scan - libgcrypt we need to update to latest | CVE-2024-2236 | |
| GRD-95025 | Tenable Scan - nano rpm need to be updated | CVE-2024-5742 | |
| GRD-95137 | Tenable Scan - vim rpm need to be updated | CVE-2021-3903 | |
| GRD-96187 | Tuned-2.22.1-3.el9_4.noarch | CVE-2024-52336 | |
| GRD-96809 | Tenable Scan - emacs rpm needs to be updated | CVE-2025-1244 | |
| GRD-97707 | PSIRT: PVR0630165 - netty-incubator-codec-classes-quic-0.0.52.Final.jar (Publicly disclosed vulnerability found by Mend) | CVE-2025-29908 | |
| GRD-97817 | PSIRT: PVR0631190 - 3RD PARTY: IBM Security Guardium - Stored XSS | ||
| GRD-98135 | FreeType Remote Code Execution Vulnerability - CVE-2025-27363 | CVE-2025-27363 | |
| GRD-98305 | PSIRT: PVR0636917 - IBM Guardium Data Protection is vulnerable to multiple Tomcat vulnerabilities | CVE-2025-24813, CVE-2024-50379 | |
| GRD-98466 | PSIRT: PVR0586685: Priv Escalation: TZAVW-0003: cp_wrapper | ||
| GRD-98467 | PSIRT: PVR0586685: Priv Escalation: TZAVW-0006: log_access_wrapper | ||
| GRD-98468 | PSIRT: PVR0586685: Priv Escalation: TZAVW-0007: guard_chown_wrapper | ||
| GRD-98551 | PSIRT: PVR0586685: Priv Escalation: TZAVW-0008: tar_wrapper | ||
| GRD-98554 | PSIRT: PVR0586685: Priv Escalation: TZAVW-0013: iptables_wrapper | ||
| GRD-98555 | PSIRT: PVR0586685: Priv Escalation: TZAVW-0014: server_receiver.pl |
| Issue key | Summary |
|---|---|
GRD-86940 | Universal connector Kafka cluster nodes are not part of backup. Workaround: This will be fixed in a future patch. |
GRD-98849 GRD-98851 | Upgrading from 12.0p105 (see release note) to 12.0p120 and applying universal connector patch 12.0p5002 (see release note) results in two different Oracle packages. "OUA over JDBC connect 2.0" profile is recommended. Do not use the "OUA over JDBC connect" profile. Workaround: If Oracle data source profiles using the universal connector were installed on the system before the upgrade, uninstall the "OUA over JDBC connect" profiles, upload the same JDBC driver under a new name, and use this JAR to configure the "OUA over JDBC connect 2.0" new profile. |
GRD-99009 GRD-100366 | Replacing dead Kafka broker node with healthy nodes has the following limitations:
|
GRD-100109 | When viewing multiple predefined Kafka Cruise Control reports, maximizing one report minimizes the others and places them as tabs at the lower-right part of the window. However, these tabs are only visible when hovering the mouse. |
GRD-100601 | In case of a central manager failover, if a connector was previously failing, the system might not heal itself, resulting in incomplete or missing traffic capture across deployed managed units. |
GRD-100746 | If the unified connector profile is installed on X collectors, and all of them remain unavailable for more than 2 hours, data loss may occur. |
GRD-100866 GRD-101053 | If 1,500 or more data sources profiles are installed on a central manager, loading the universal connector pages might delay. |
| GRD-100934 | The recommended disk size of kafka-node unit is 1TB. Disk size below 1TB may result in the disk becoming full, causing the kafka cluster to fail. |
GRD-101420 | For "OUA over JDBC connect 2.0", one Kafka cluster can handle up to 1,250 data sources profiles. |
GRD-101478 | Unable to create Kafka cluster by using the grdapi In Guardium version 12.1 with patch 12.0p120 installed. Workaround: Create the Kafka cluster by using the UI. For more information, see Creating Kafka clusters. |
GRD-101566 | Unable to use ojdbc8.jar file for bulk profile upload flow for "OUA over JDBC connect 2.0" and "OUA MultiTenant over JDBC connect 2.0" profiles. Workaround: To use the bulk upload feature, upload the ojdbc8.jar file individually with a unique name for the first data source profile of “OUA MultiTenant over JDBC connect 2.0” or “OUA over JDBC connect 2.0". |
| GRD-101762 | In Guardium version 12.0p115 (see release note) with universal connector patch 12.0p1006 (see release note) installed, if patch 12.0p120 is applied before patch 12.0p5002 (see release note), then the profile creation of "OUA over JDBC connect 2.0" fails with an error. Workaround: In Guardium version 12.0p115 with universal connector patch 12.0p1006 installed, first apply patch 12.0p5002 and then apply patch 12.0p120. |
Was this topic helpful?
Document Information
Modified date:
12 September 2025
UID
ibm17233715