IBM Support

Release of Guardium Data Protection sniffer patch 12.0p4015

Release Notes


Abstract

This technical note provides guidance for installing IBM Guardium Data Protection sniffer patch 12.0p4015, including any new features or enhancements, resolved or known issues, or notices associated with the patch.

Content

Patch information
  • Patch file name: SqlGuard-12.0p4015_Snif_Nov_20_2025.tgz.enc.sig
  • MD5 checksum: 4ff4686f434c68c261ba52933bef1d0d
 
Finding the patch 
  1. Select the following options to download this patch on the IBM Fix Central website and click Continue.
    1. Product selector: IBM Security Guardium
    2. Installed Version: 12.0, 12.1, or 12.2
    3. Platform: All
  2. On the "Identify fixes" page, select Browse for fixes and click Continue.
  3. On the "Select fixes" page, select Appliance Sniffer Patch. Then, enter the patch information in the Filter fix details field to locate the patch.
 
For information about Guardium patch types and naming conventions, see the Understanding Guardium patch types and patch names support document.
 
 
Installation
Notes:
  • This universal sniffer patch can be installed on releases of Guardium 12.0, 12.1, and 12.2.
  • Sniffer patches are cumulative, they contain all previous sniffer patches for that major version.
  • This patch restarts the sniffer process.
 
Overview:
  1. Download the patch and extract the compressed package outside the Guardium system.
  2. Be sure to check the latest version of these patch release notes online just before you install this patch.
  3. Pick a "quiet" or low-traffic time  to install the patch on the Guardium system.
  4. Install patches in a top-down manner on all Guardium systems: start with the central manager, then aggregators, then the collectors.  This sniffer patch must be installed across all the appliances such as the central manager, aggregators, and collectors.
 
For more information, see How to install patches in the Guardium documentation.
 
 
New currency items
This patch provides the following new currency items.
 
Issue keySummary
GRD-102944Postgres 18 
EDB Postgres 17.5
GRD-102964Redis Enterprise 7.22
GRD-108075MariaDB 12.0
GRD-111732Yugabyte v2025.1.0.1
GRD-112270Mongo 8.2
 
Resolved issues
This patch resolves the following issues.
 
PatchIssue keySummaryKnown issue (APAR)
12.0p4012 See release notes for sniffer patch 12.0p4012 
12.0p4015GRD-97188Fixed federated authentication handlingDT451685
 
GRD-97520
Reverted previous change to %%receiptTime and %%SQLTimestamp in sniffer patch 12.0p4012. 
 
%%receiptTime and %%SQLTimestamp now represent the SQL traffic's timestamp sent from S-TAP. %%receiptTime is in human-readable string format and %%receiptTimeMills is the integer number value representing the UNIX POSIX timestamp in milliseconds.
DT437122
 GRD-102716Fixed parser issues for Microsoft SQL Server parser.DT448253
 GRD-104903Fixed handling for invalid messages for feed SSL port to prevent Sniffer instability.DT454854
 GRD-105413Fixed Parser errors for Netezza.DT448685
 GRD-107782Allow action REDACT in session-level policies to be checked per request.DT450559
 GRD-109143Fixed Sybase and Microsoft SQL Server parser issues. 
 GRD-109498Added a new guard parameter, EVAL_RULE_APP_USER_PER_SQL, to control enabling the app user rule criteria evaluation for the Oracle Unified Audit (OUA) database protocol.DT454346
 GRD-109566Microsoft SQL Server handling for zero bytes in network traffic.DT454947
 GRD-109729Fixed parser issues for PostgreSQL.DT454953
 GRD-109833Reduce logging of instance records when there is no constructDT455025
 GRD-109853Fixed parser issues for Microsoft SQL Server parser.DT455030
 GRD-110954Fixed parser issues for TeradataDT454215
 GRD-111253Fixed handling for unknown traffic type for CassandraDT454975
 GRD-111255Neo4j: Username is not captured by Guardium when executed from cypher shell.DT455245
 GRD-111304Improved logging retry mechanism.DT454948
 GRD-111999Fixed Windows Software TAP (S-TAP) Protocol 8 heart beat message handling.DT454959
 GRD-113824Added a new guard parameter, DASHA_RETENTION, to allow DASHA to calculate the connection retention time dynamically. 
 

[{"Type":"MASTER","Line of Business":{"code":"LOB76","label":"Data Platform"},"Business Unit":{"code":"BU048","label":"IBM Software"},"Product":{"code":"SSMPHH","label":"IBM Security Guardium"},"ARM Category":[{"code":"a8m3p000000PCTuAAO","label":"Platform\/Installation\/Deployment"},{"code":"a8m0z000000Gp0SAAS","label":"SNIFFER"}],"ARM Case Number":"","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"12.0.0;12.1.0;12.2.0"}]

Document Information

Modified date:
26 November 2025

UID

ibm17251177