Release Notes
Abstract
This technical note provides guidance for installing IBM Guardium Data Protection sniffer patch 12.0p4015, including any new features or enhancements, resolved or known issues, or notices associated with the patch.
Content
Patch information
- Patch file name: SqlGuard-12.0p4015_Snif_Nov_20_2025.tgz.enc.sig
- MD5 checksum: 4ff4686f434c68c261ba52933bef1d0d
Finding the patch
- Select the following options to download this patch on the IBM Fix Central website and click Continue.
- Product selector: IBM Security Guardium
- Installed Version: 12.0, 12.1, or 12.2
- Platform: All
- On the "Identify fixes" page, select Browse for fixes and click Continue.
- On the "Select fixes" page, select Appliance Sniffer Patch. Then, enter the patch information in the Filter fix details field to locate the patch.
For information about Guardium patch types and naming conventions, see the Understanding Guardium patch types and patch names support document.
Installation
Notes:
- This universal sniffer patch can be installed on releases of Guardium 12.0, 12.1, and 12.2.
- Sniffer patches are cumulative, they contain all previous sniffer patches for that major version.
- This patch restarts the sniffer process.
Overview:
- Download the patch and extract the compressed package outside the Guardium system.
- Be sure to check the latest version of these patch release notes online just before you install this patch.
- Pick a "quiet" or low-traffic time to install the patch on the Guardium system.
- Install patches in a top-down manner on all Guardium systems: start with the central manager, then aggregators, then the collectors. This sniffer patch must be installed across all the appliances such as the central manager, aggregators, and collectors.
For more information, see How to install patches in the Guardium documentation.
New currency items
This patch provides the following new currency items.
| Issue key | Summary |
|---|---|
| GRD-102944 | Postgres 18 EDB Postgres 17.5 |
| GRD-102964 | Redis Enterprise 7.22 |
| GRD-108075 | MariaDB 12.0 |
| GRD-111732 | Yugabyte v2025.1.0.1 |
| GRD-112270 | Mongo 8.2 |
Resolved issues
This patch resolves the following issues.
| Patch | Issue key | Summary | Known issue (APAR) |
|---|---|---|---|
| 12.0p4012 | See release notes for sniffer patch 12.0p4012 | ||
| 12.0p4015 | GRD-97188 | Fixed federated authentication handling | DT451685 |
GRD-97520 | Reverted previous change to %%receiptTime and %%SQLTimestamp in sniffer patch 12.0p4012. %%receiptTime and %%SQLTimestamp now represent the SQL traffic's timestamp sent from S-TAP. %%receiptTime is in human-readable string format and %%receiptTimeMills is the integer number value representing the UNIX POSIX timestamp in milliseconds. | DT437122 | |
| GRD-102716 | Fixed parser issues for Microsoft SQL Server parser. | DT448253 | |
| GRD-104903 | Fixed handling for invalid messages for feed SSL port to prevent Sniffer instability. | DT454854 | |
| GRD-105413 | Fixed Parser errors for Netezza. | DT448685 | |
| GRD-107782 | Allow action REDACT in session-level policies to be checked per request. | DT450559 | |
| GRD-109143 | Fixed Sybase and Microsoft SQL Server parser issues. | ||
| GRD-109498 | Added a new guard parameter, EVAL_RULE_APP_USER_PER_SQL, to control enabling the app user rule criteria evaluation for the Oracle Unified Audit (OUA) database protocol. | DT454346 | |
| GRD-109566 | Microsoft SQL Server handling for zero bytes in network traffic. | DT454947 | |
| GRD-109729 | Fixed parser issues for PostgreSQL. | DT454953 | |
| GRD-109833 | Reduce logging of instance records when there is no construct | DT455025 | |
| GRD-109853 | Fixed parser issues for Microsoft SQL Server parser. | DT455030 | |
| GRD-110954 | Fixed parser issues for Teradata | DT454215 | |
| GRD-111253 | Fixed handling for unknown traffic type for Cassandra | DT454975 | |
| GRD-111255 | Neo4j: Username is not captured by Guardium when executed from cypher shell. | DT455245 | |
| GRD-111304 | Improved logging retry mechanism. | DT454948 | |
| GRD-111999 | Fixed Windows Software TAP (S-TAP) Protocol 8 heart beat message handling. | DT454959 | |
| GRD-113824 | Added a new guard parameter, DASHA_RETENTION, to allow DASHA to calculate the connection retention time dynamically. |
[{"Type":"MASTER","Line of Business":{"code":"LOB76","label":"Data Platform"},"Business Unit":{"code":"BU048","label":"IBM Software"},"Product":{"code":"SSMPHH","label":"IBM Security Guardium"},"ARM Category":[{"code":"a8m3p000000PCTuAAO","label":"Platform\/Installation\/Deployment"},{"code":"a8m0z000000Gp0SAAS","label":"SNIFFER"}],"ARM Case Number":"","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"12.0.0;12.1.0;12.2.0"}]
Was this topic helpful?
Document Information
Modified date:
26 November 2025
UID
ibm17251177