IBM Support

Release of Guardium Data Protection Linux-UNIX S-TAP 12.2.1.1 r123268

Release Notes


Abstract

This technical note provides guidance for installing IBM Guardium Data Protection Linux and UNIX Agents 12.2.1.1 r123268, including resolved and known issues, and notices associated with the patch.

Content

Patch information
Product:IBM Guardium
Release version:Guardium 12.2 Linux-UNIX Software TAP (S-TAP)
Completion date:18 March 2026
 
 
Fix IDs
Guardium_12.2.1.1_S-TAP_AIX_r123268
Guardium_12.2.1.1_S-TAP_Amazon_r123268
Guardium_12.2.1.1_S-TAP_Debian_r123268
Guardium_12.2.1.1_S-TAP_Modules_r123268
Guardium_12.2.1.1_S-TAP_RedHat_r123268
Guardium_12.2.1.1_S-TAP_Solaris_r123268
Guardium_12.2.1.1_S-TAP_Suse_r123268
Guardium_12.2.1.1_S-TAP_Ubuntu_r123268
Guardium_12.2.1.1_S-TAP_zLinux_r123268
 
 
Finding the patch
  1. Select the following options to download this patch on the IBM Fix Central website and click Continue.
    • Product selector: IBM Security Guardium
    • Installed Version: 12.2
    • Platform: AIX, Linux, or Solaris
  2. On the "Identify fixes" page, select Browse for fixes and click Continue.
  3. On the "Select fixes" page, select Database Agent (STAP, GIM and CAS). Then, enter the patch information in the Filter fix details field to locate the patch.
 
When to restart or reboot after installing or upgrading to Guardium 12.2 Linux-UNIX S-TAP
 
To view full traffic, certain databases must be restarted after you upgrade to Guardium 12.2.1 from the following S-TAP versions.  You must stop your database before you upgrade, or restart the database after you upgrade if traffic stopped capturing. The affected S-TAP versions are:
 
  • STAP-11.5.4.1_r115368_1
  • STAP-12.0.0.0_r115418_v12_0_1
 
 
 
Attention
 
This patch is a replacement for Linux-UNIX S-TAP 12.2.1.0 r122289 
This patch fixes an issue in the previously released patch Linux-UNIX S-TAP 12.2.1.0 r122289 that might cause kernel memory leaks leading to instability on database servers. Installing this updated S‑TAP patch will stop all new memory leaks, but it will not release memory that was already leaked under the affected versions. Therefore, IBM strongly recommends rebooting the server after upgrading to ensure all previously leaked and unrecoverable kernel memory is cleared. A full reboot is required at your earliest convenience to return the system to a known‑good state. For more information, see Linux-UNIX S-TAP 12.1.3.0_r122091_1 and 12.2.1.0_r122289 might cause kernel memory leaks.  
 
 

Single-stream agent releases 
Starting with Guardium Data Protection 12.2.1, most of the Linux-UNIX and Windows agents for Guardium Data Protection versions 12.0 and later are now released in a "single stream". Previously, each Guardium 12.x release (12.0, 12.1, and 12.2) had its own separate agent installers and patch packages. With the move to single-stream packaging, the agent binaries are unified into one continuous release line, so the same installation and upgrade package applies across multiple Guardium 12.x versions. This simplifies maintenance, reduces version divergence, and ensures consistent feature and fix availability across all supported 12.x environments. 

File names starting with 12.x are now applicable to all current Guardium 12.x versions (12.0, 12.1, and 12.2), and future releases within the Guardium 12.x family. The single-stream packaging currently applies to the following agents: 

  • Guardium Configuration Auditing System (CAS)
  • Guardium File Activity Monitor (FAM) for Windows
  • Guardium Installation Manager (GIM)
  • Guardium Software TAP (S-TAP)


With this change, customers no longer need to locate version-specific agent packages for each 12.x release. Installing the latest 12.x agent package will be supported across all 12.x collector and aggregator versions that meet the documented compatibility requirements.  

Note: The single-stream packaging does not currently apply to External S-TAP agents. 

For more information, see Single-stream agent releases
 
 
New features and enhancements
 

Edge Gateway
Modernize your data collection with a new Kubernetes-based monitoring pipeline. The Edge Gateway is built for high performance and scalability, making it easy to monitor both on-premises and cloud environments while reducing appliance management. With seamless integration into existing Guardium aggregators, Guardium Data Security Center (GDSC) SaaS, and the new long-term retention feature, the Edge Gateway offers a modern alternative to Guardium collectors. S-TAP 12.2.1 agents are capable of streaming to the Edge Gateway. 

guard-connfig-update 

The script guard-config-update can now be used to update inspection engines from a database server command line.
 
 
New database and platform support
 
Databases
  • MarkLogic 11.2.0 and 11.3.2
  • HyperSQL 2.7.4
  • MongoDB 8.2
  • EDB Postgres 17.5
  • Postgres 18.0
  • Yugabyte 2025.1.0.1
  • MariaDB 12.0.2
  • Redis 7.22
 
Platforms
  • Red Hat 10 x86_64
  • Suse 15 SP 7
 
 
Resolved issues
 
Patch
Issue keySummaryKnown issue (APAR)
12.2.0.0 r121306
 
See release note for patch 12.2.0.0 r121306
 
12.2.1.1 r123268GRD-95241Modified query for OUA to avoid invalid data convergence in some corner casesDT448770
 GRD-101013Added support for kernel 6.4.0-150600.23.33-default.ppc64leDT454880
 GRD-104989Fixed an issue where MongoDBv7.0.15 with A-TAP enabled is not generating extrusion alertsDT448174
 GRD-105345Fixed a connection issue when load balancing is in FAILOVER modeDT448659
 GRD-115706Added support for Oracle A-TAP instance discovery. Once A-TAP is activated, the DB process name will appear as the DB exec name instead of <DBtype>_guard_original. 
 GRD-109438Priority packets are disabled by default when an Exit connection is configured in order to improved exit performance and reduce packet drops. To re-enable priority packets, a hidden parameter, ignore_pp_for_exit, can be set in guard_tap.ini.DT458322
 GRD-110754Added delay and a buffer readiness check before launching ktap_reader thread to address potential kernel panic when ring buffers are enabled and participate_in_load_balancing is updated.DT455613
 GRD-111999Fixed an issue related to reading thread between S-TAP and collectorDT455401
 GRD-114872Fixed an erroneous log message that was printing when tap_debug_output_level=0  
 GRD-115837A mismatch in DB2_HOME and db-install-dir is now logged as a sever message in db2diag.log as this configuration would result in no traffic being captured for Db2 Exit. 
 GRD-120975

Fixed an issue that might cause kernel memory leaks leading to instability on database servers. For more information, see Linux-UNIX S-TAP 12.1.3.0_r122091_1 and 12.2.1.0_r122289 might cause kernel memory leaks

Important post-upgrade requirement

Installing this S-TAP update will stop all new memory leaks, but it will not release memory that was already leaked under the affected versions. Therefore, IBM strongly recommends rebooting the server after upgrading to ensure all previously leaked and unrecoverable kernel memory is cleared. A full reboot is required at your earliest convenience to return the system to a known-good state.

 
 GRD-121315Fixed S‑TAP instability during Guardium Installation Manager (GIM) upgrades with the global session key enabled. 
 GRD-121381Fixed an issue that occurred when the global session key was enabled, where saving priority packets could run out of space and impact S‑TAP stability. 
 
 
Known limitations and workarounds
Issue keySummary
GRD-109484
While attempting to create an OceanBase datasource in Oracle mode for S-TAP verification, the connection fails, preventing the datasource from being created successfully.
GRD-114064After upgrading A-TAP to version 12.2.1, failover events lose existing database-session attributes (db_user, client_ip, db_name, source_program) due to a change in shared-memory segment sizing between 12.2.0 and 12.2.1.

A fix is available in an upcoming release.
GRD-114495FamMonitor does not appear on the S-TAP control page in the Guardium UI following registration with a managed unit (MU). This issue is specific to collectors already configured as MUs.

Workaround: If FAM is registered with a collector after registering collector to central manager, restart the sniffer to resolve the issue. 
GRD-114880When the shared-memory segment size for the priority packets or failover information hash table is changed during an upgrade from a previous release or by modifying the tap_failover_session_size parameter, restarting Unix S-TAP will result in the loss of previously saved priority packet data.

A fix is available in an upcoming release.
GRD-114405
GRD-115382
In the modernized GUI for S-TAP Control, you cannot set a new G-host as primary. This regression was functional in earlier releases. You also cannot control the sequence to configure failover order. 

Workaround: After adding the G-host, save and reopen the edit panel to manually edit the S-TAP configuration
and designate the desired primary host. 

For UNIX S-TAPs, you can also edit the guard_tap.ini file manually to update the failover order for each G-host.
GRD-115920When Edge Gateway is enabled, the Run Diagnostics function from the S-TAP Control page does not work correctly. 

Workaround: S-TAP diagnostics can be triggered from the central manager with Edge Gateway enabled. It requires that the new gim_server parameter default value is set to NULL in the guard_tap.ini file.
GRD-115945In MarkLogic database version 11.3.2, a discrepancy has been observed where the Session Key and Session ID are generated uniquely for each query from the Query console, even when multiple queries originate from the same session. This unexpected behavior may cause confusion for users relying on consistent session identifiers.

A fix is available in an upcoming release.
GRD-116325Activating the Kernel TAP (K-TAP) dynamic ring buffers parameter can lead to database server instability. Keep the parameter disabled at this time. A resolution is planned for an upcoming release.
GRD-116728A-TAP activated by non-root user cannot be deactivated by a non-root user after discovery

Workaround: Use root access to deactivate A-TAP.
GRD-116790Custom K-TAP for Red Hat Enterprise Linux 10 x86_64 servers is not supported

A fix is available in an upcoming release.
GRD-116826Traffic for MySQL X protocol is not captured

A fix is available in an upcoming release.
GRD-121989

If configuration changes are made to the guard_tap.ini file from the GUI prior to performing a live upgrade of Linux-UNIX S-TAP 12.2.1.1 r123268, the Inspection Engine and SQLGuard configurations cannot be merged successfully. This does not occur during a fresh install of Linux-UNIX S-TAP 12.2.1.1 r123268. 

A fix is available in an upcoming release.

GRD-123080

Postgres auto-archiving process fails with ATAP enabled. 

Workaround:  preload the library libdl.so.2. 

Steps:

  • Edit the postgresql.conf file.
  • Modify the archive_command entry to include LD_PRELOAD=/usr/lib64/libdl.so.2

For example: archive_command = 'LD_PRELOAD=/usr/lib64/libdl.so.2 gzip -1 < %p > /var/lib/pgsql/backup/%f.gz'

 
 
Installers with MD5Sums
 
MD5Sum
File name
2cdebcae1e39d7571834ab8bcfe7db70consolidated_installer.sh
17be7e6ecada80c4d6aa728b947abfeaguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-aix-7.2-aix-powerpc.gim
dc1b25d9c2fa26c373f182094a37b60fguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-aix-7.2-aix-powerpc.gim.sh
bcabde614276bf6a2f56f09034163ad6guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-aix-7.3-aix-powerpc.gim
5690be538f79c0c1547050944b70cfa8guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-aix-7.3-aix-powerpc.gim.sh
c32bce106808eea3842c5b92f050e2d9guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-amzn-2023-linux-aarch64.gim
ba145e67077f92e1d1666fd4e94e86a9guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-amzn-2023-linux-aarch64.gim.sh
736cb5a171b0895acb9e85c3c867e04cguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-amzn-2023-linux-x86_64.gim
b58c00489a87ba002949da8fa9b80d82guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-amzn-2023-linux-x86_64.gim.sh
28cc4b00317174df7dc6ab9c1a47ad2bguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-amzn-2-linux-aarch64.gim
98ae1cd5d7586122e2df2697f572e24fguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-amzn-2-linux-aarch64.gim.sh
d29868d2abc947b328ff8d3531d413cdguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-amzn-2-linux-x86_64.gim
8761d0976cf6d30cd4f78c18501283faguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-amzn-2-linux-x86_64.gim.sh
9f416f7a7969461fb9db076fe98a21b4guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-debian-11-linux-x86_64.gim
73278b8dd6328a5d87f7ebff0a3cc092guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-debian-11-linux-x86_64.gim.sh
d7e49aa42d68489e83fe5037fd7cd91aguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-debian-12-linux-x86_64.gim
3eb96c856c8529dbf72a82ca0e32c4ecguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-debian-12-linux-x86_64.gim.sh
29739dcd48e190d99060b8cc3ef2e784guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-rhel-10-linux-x86_64.gim
e579b279b15a6d5a4ce7cc564f505296guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-rhel-10-linux-x86_64.gim.sh
d7faca295b9638e05898a4335c5d8561guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-rhel-7-linux-ppc64.gim
51897e90274182e98980548fe885ad9fguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-rhel-7-linux-ppc64.gim.sh
9e2b7938d4b8e0f84e59944144be78caguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-rhel-7-linux-ppc64le.gim
9dc9740d10b4b9f8e22950324973ba60guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-rhel-7-linux-ppc64le.gim.sh
d869e0837a9f8e4e414bba2910dfad2dguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-rhel-7-linux-s390x.gim
515c3a33fe5dc705e0ce20e8d720ec45guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-rhel-7-linux-s390x.gim.sh
0b5f34a190d1af6c032a1672364b972aguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-rhel-7-linux-x86_64.gim
c4f5103fd9093f533646c69d8ed5011eguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-rhel-7-linux-x86_64.gim.sh
172ff85ecbe57278f63eb2a84e327503guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-rhel-8-linux-ppc64le.gim
7d8d0b0f1aa9bde8d340250e5f9ba1b0guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-rhel-8-linux-ppc64le.gim.sh
8e355f51a0e293123dde07f5c3cbf6ecguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-rhel-8-linux-s390x.gim
c8f51fcc31fd3e638086bc461ef5d894guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-rhel-8-linux-s390x.gim.sh
58c729c65c31ee476d90e7a971c9148dguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-rhel-8-linux-x86_64.gim
c6fc50d283fa36bb64a1eb74d936d408guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-rhel-8-linux-x86_64.gim.sh
dd82ed8f9c976d2665906c331ec0098eguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-rhel-9-linux-ppc64le.gim
3989cb17586a964ab661ce0f76cad1bfguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-rhel-9-linux-ppc64le.gim.sh
26a3ae5a81031e3b9e2e99c170b85901guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-rhel-9-linux-s390x.gim
3217efecd931ea27d3429a44c3397094guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-rhel-9-linux-s390x.gim.sh
878c55928b32337a48e0f772ca89016aguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-rhel-9-linux-x86_64.gim
9663a4a96bd12d6da940fa2b8a6a0896guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-rhel-9-linux-x86_64.gim.sh
5bbbdd8418d9bc956d64213eff01dc9cguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-sunos-5.10-solaris-i386_64.gim
595ff7c9c0462add943bc0f83d406f36guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-sunos-5.10-solaris-i386_64.gim.sh
cb9a799bfb20a0384e6576a80d347c44guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-sunos-5.10-solaris-sparc.gim
646618096edd17e35136ea7836266588guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-sunos-5.10-solaris-sparc.gim.sh
cde0c65e73819afe20e6d9df58fa45deguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-sunos-5.11-solaris-i386_64.gim
eadb7a958bea25ae58e11deb6235c157guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-sunos-5.11-solaris-i386_64.gim.sh
e74c41058eae79fe0da27327cc5143d1guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-sunos-5.11-solaris-sparc.gim
3bc06a68fb9ced3d7952481a633b6d52guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-sunos-5.11-solaris-sparc.gim.sh
d52b7b0d1221b87cc6b5c3bbbf4bdfb9guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-suse-12-linux-ppc64le.gim
9ce0c4b1eba5f00b9667549375cf105dguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-suse-12-linux-ppc64le.gim.sh
b78b5fcdf087600db9335c996a3b5276guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-suse-12-linux-s390x.gim
23fc618dbb58d9449d23447a71f32715guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-suse-12-linux-s390x.gim.sh
0e3fe38e54da13824269516c4ff5c55aguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-suse-12-linux-x86_64.gim
9cefb936844182b04ce35a98776e2f61guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-suse-12-linux-x86_64.gim.sh
a2d93e6c002ef4e4c15bff0a21c4fa59guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-suse-15-linux-ppc64le.gim
ba163cdec961576157d7d4be2f261777guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-suse-15-linux-ppc64le.gim.sh
bf61c9b2d617f6b435284ae92d11dc0bguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-suse-15-linux-s390x.gim
1e6a73b9d9d45a59531bb9f1d05577efguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-suse-15-linux-s390x.gim.sh
0d976ae6004b848dcd5fb689e204ea3cguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-suse-15-linux-x86_64.gim
e5578e73bab78e3a4133517e4027fdfaguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-suse-15-linux-x86_64.gim.sh
e98dd2c86808d52c5e3a18c153150d29guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-ubuntu-16.04-linux-x86_64.gim
aae486e02df6490adf40c363914726bfguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-ubuntu-16.04-linux-x86_64.gim.sh
d5a7a4c41ba00577171f3910ad198b47guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-ubuntu-18.04-linux-s390x.gim
8d11486ee61096578d5f416d86afb6f6guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-ubuntu-18.04-linux-s390x.gim.sh
476946d8af82d65fac1dc025f1771007guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-ubuntu-18.04-linux-x86_64.gim
a7170761000b2e0821f21d39a55ce313guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-ubuntu-18.04-linux-x86_64.gim.sh
433f72ea2aefdcc98b69c54c8bd9521aguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-ubuntu-20.04-linux-s390x.gim
471dbd25a8801a662d897bf625deb362guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-ubuntu-20.04-linux-s390x.gim.sh
ebadeb9ab7e172743dd833329455df89guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-ubuntu-20.04-linux-x86_64.gim
7e79a26c1b437bd253966246b60a1777guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-ubuntu-20.04-linux-x86_64.gim.sh
339bd00fbe78d36c37ff9002cbb7d9a4guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-ubuntu-22.04-linux-s390x.gim
2d7e81c11bda4d999ef3f134f78376eaguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-ubuntu-22.04-linux-s390x.gim.sh
f17c378620ccd282728ce8e542903c3bguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-ubuntu-22.04-linux-x86_64.gim
4f8deb149b3e038ede6048f500c0159dguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-ubuntu-22.04-linux-x86_64.gim.sh
ec6f82eb6272923e706af71ab13a82e2guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-ubuntu-24.04-linux-s390x.gim
38340ca754f43031b25af25d83b98a3eguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-ubuntu-24.04-linux-s390x.gim.sh
283a22ab22acd9021f6a221e467d87baguard-bundle-STAP-12.2.1.1_r123268_v12_x_1-ubuntu-24.04-linux-x86_64.gim
2d5854c4a53f9140280c53b8701710c6guard-bundle-STAP-12.2.1.1_r123268_v12_x_1-ubuntu-24.04-linux-x86_64.gim.sh
b28e78d9c1d501094498550d7cd12d86guardium_module_signing.der
77746cd1b3c117f03d760aa7f3721fbdguardium_module_signing_suse15.der
865f6c370c326c3394078ac21137df36guard-stap-12.2.1.1.123268-1-amzn-2023-linux-aarch64.aarch64.rpm
b7dcfa3a4e3a3eab4b3ee3137f90c385guard-stap-12.2.1.1.123268-1-amzn-2023-linux-x86_64.x86_64.rpm
48b9a9929d6b86ae86abdbea887aa20fguard-stap-12.2.1.1.123268-1-amzn-2-linux-aarch64.aarch64.rpm
04be6ab5453910f6cfc134d05a3f33feguard-stap-12.2.1.1.123268-1-amzn-2-linux-x86_64.x86_64.rpm
37f2b06602e43121c40bbb0153159919guard-stap-12.2.1.1.123268-1-rhel-10-linux-x86_64.x86_64.rpm
5101a42f35bb76356b6b8441ce92f478guard-stap-12.2.1.1.123268-1-rhel-7-linux-ppc64le.ppc64le.rpm
39d72d07d75fbe7f271e55bd183c0119guard-stap-12.2.1.1.123268-1-rhel-7-linux-ppc64.ppc64.rpm
f20e1236b2918a8421effe705e497064guard-stap-12.2.1.1.123268-1-rhel-7-linux-s390x.s390x.rpm
22eba069bc135c2fe50287e1855b3ca1guard-stap-12.2.1.1.123268-1-rhel-7-linux-x86_64.x86_64.rpm
f1510f2e4b6c6ebca1f2b5fd5eada0b2guard-stap-12.2.1.1.123268-1-rhel-8-linux-ppc64le.ppc64le.rpm
fbc07be83acbc658354fa06a8ab7dd34guard-stap-12.2.1.1.123268-1-rhel-8-linux-s390x.s390x.rpm
067cc1aabe03fce688e9eb6ae572ac15guard-stap-12.2.1.1.123268-1-rhel-8-linux-x86_64.x86_64.rpm
2e9047c3dc7048cc76fff98b24cdc1daguard-stap-12.2.1.1.123268-1-rhel-9-linux-ppc64le.ppc64le.rpm
6ffa9d1fed0ae02956f4b9c0d287a2a5guard-stap-12.2.1.1.123268-1-rhel-9-linux-s390x.s390x.rpm
58e205c7237f6c068d92ab55ef9aa6d1guard-stap-12.2.1.1.123268-1-rhel-9-linux-x86_64.x86_64.rpm
9c5b0ebd284e00360bd655533856cea8guard-stap-12.2.1.1.123268-1-suse-12-linux-ppc64le.ppc64le.rpm
f23d6e825edcd5407106486799744da5guard-stap-12.2.1.1.123268-1-suse-12-linux-s390x.s390x.rpm
0a3486c3d73a109877edee92f3250096guard-stap-12.2.1.1.123268-1-suse-12-linux-x86_64.x86_64.rpm
ca24d63ff56f69f1b8036684833a9fceguard-stap-12.2.1.1.123268-1-suse-15-linux-ppc64le.ppc64le.rpm
736cbe1484b70c14df486d503a04623dguard-stap-12.2.1.1.123268-1-suse-15-linux-s390x.s390x.rpm
4a612667f9f3b32b1b37e798865ad185guard-stap-12.2.1.1.123268-1-suse-15-linux-x86_64.x86_64.rpm
441e7010d0e1ede75f16853402d2576eguard-stap-12.2.1.1_r123268_v12_x_1-aix-7-aix-powerpc.sh
a66e53e83fd5226977207f286754ff9aguard-stap-12.2.1.1_r123268_v12_x_1-aix.sh
0aa60677a0cd26ad4aec7805ab72c4b8guard-stap-12.2.1.1_r123268_v12_x_1-amzn-2023-linux-aarch64.sh
d7a9f6b3e3fcd9357fc4c897c3055bbcguard-stap-12.2.1.1_r123268_v12_x_1-amzn-2023-linux-x86_64.sh
dbb027dee0ecd10ea1ee61278383184cguard-stap-12.2.1.1_r123268_v12_x_1-amzn-2-linux-aarch64.sh
cab47508c2129149ffd68d1dc19eec11guard-stap-12.2.1.1_r123268_v12_x_1-amzn-2-linux-x86_64.sh
fafbab3f9219024268e1bed0bf450fb3guard-stap-12.2.1.1_r123268_v12_x_1-amzn.sh
c9bea1aa07a2baeb9025d0eee32a6fe5guard-stap-12.2.1.1_r123268_v12_x_1-debian-11-linux-x86_64.sh
e71208e3f86a1a574ccde78a7caf467eguard-stap-12.2.1.1_r123268_v12_x_1-debian-12-linux-x86_64.sh
7e0dd8a50bc8fea0563f28b946a4e27fguard-stap-12.2.1.1_r123268_v12_x_1-debian.sh
d2a1379da1fc00ae8d2f625f89826903guard-stap-12.2.1.1_r123268_v12_x_1-rhel-10-linux-x86_64.sh
c10e18bf1027549cb5a5fd162fba10cbguard-stap-12.2.1.1_r123268_v12_x_1-rhel-7-linux-ppc64le.sh
868253e12710696da95882bb76ec7c55guard-stap-12.2.1.1_r123268_v12_x_1-rhel-7-linux-ppc64.sh
31e3fd824a16623e4649af032d03c637guard-stap-12.2.1.1_r123268_v12_x_1-rhel-7-linux-s390x.sh
dd1494c56452a0b4d9a14f5fba2e92fdguard-stap-12.2.1.1_r123268_v12_x_1-rhel-7-linux-x86_64.sh
61335afcf634708642cd89676227b9b3guard-stap-12.2.1.1_r123268_v12_x_1-rhel-8-linux-ppc64le.sh
c090cdeda5cedb9bc60ecf230c082812guard-stap-12.2.1.1_r123268_v12_x_1-rhel-8-linux-s390x.sh
2147b0d82b551fc436e5701cff8f1eb0guard-stap-12.2.1.1_r123268_v12_x_1-rhel-8-linux-x86_64.sh
1c5fab9dc0a60d64c0b991e6b3329d83guard-stap-12.2.1.1_r123268_v12_x_1-rhel-9-linux-ppc64le.sh
d4edf4d8b78e5e9b32640f7ead8dcc17guard-stap-12.2.1.1_r123268_v12_x_1-rhel-9-linux-s390x.sh
f60e117f97b3f46ebc3b4d6d6a7eb41dguard-stap-12.2.1.1_r123268_v12_x_1-rhel-9-linux-x86_64.sh
d009879f64dfcb75cb262812490f1f9fguard-stap-12.2.1.1_r123268_v12_x_1-rhel.sh
ba9a679e62bd1cfe90adcbf61abd6d37guard-stap-12.2.1.1_r123268_v12_x_1-solaris.sh
a643c5c9bd9472427a621bf93e68aab2guard-stap-12.2.1.1_r123268_v12_x_1-sunos-5.10-solaris-i386_64.sh
b64ce9a5bc70f1bf28e0ec7691db28ecguard-stap-12.2.1.1_r123268_v12_x_1-sunos-5.10-solaris-sparc.sh
09f5a2d62246be77b02d454b54740a6bguard-stap-12.2.1.1_r123268_v12_x_1-sunos-5.11-solaris-i386_64.sh
841d41912a9f0f12914b148c56a31d76guard-stap-12.2.1.1_r123268_v12_x_1-sunos-5.11-solaris-sparc.sh
55a496a33305e8f253cb8e57f5f27abeguard-stap-12.2.1.1_r123268_v12_x_1-suse-12-linux-ppc64le.sh
988304941ccff1fab0a7df71dd9192ceguard-stap-12.2.1.1_r123268_v12_x_1-suse-12-linux-s390x.sh
454028a4fbd41b8a503e5dbe089f6f56guard-stap-12.2.1.1_r123268_v12_x_1-suse-12-linux-x86_64.sh
ba45925622122d61a90eff2c2401a896guard-stap-12.2.1.1_r123268_v12_x_1-suse-15-linux-ppc64le.sh
ccfe04cfd0acf4a72e54e48c96b76835guard-stap-12.2.1.1_r123268_v12_x_1-suse-15-linux-s390x.sh
67c0badeac0123ad6e3f77cf9f36cf3cguard-stap-12.2.1.1_r123268_v12_x_1-suse-15-linux-x86_64.sh
904f611c9abc8a416137181b1e9ff0d1guard-stap-12.2.1.1_r123268_v12_x_1-suse.sh
edc31a3bd4c0672c77fc1f6aff0b7b96guard-stap-12.2.1.1_r123268_v12_x_1-ubuntu-16.04-linux-x86_64.sh
2188b00d7c70bf55c8f0dd5c5fa352feguard-stap-12.2.1.1_r123268_v12_x_1-ubuntu-18.04-linux-s390x.sh
8b9256290b17128c66ed3e48a0d59bfcguard-stap-12.2.1.1_r123268_v12_x_1-ubuntu-18.04-linux-x86_64.sh
cee14008bde04cbf5aeab6c42bb606d7guard-stap-12.2.1.1_r123268_v12_x_1-ubuntu-20.04-linux-s390x.sh
ca5bb62346b70b42a0a5e33138213accguard-stap-12.2.1.1_r123268_v12_x_1-ubuntu-20.04-linux-x86_64.sh
7049befc2bc36f8683456c1aa4e378f5guard-stap-12.2.1.1_r123268_v12_x_1-ubuntu-22.04-linux-s390x.sh
aa389052bb47b6c422adc84bbd29ecb9guard-stap-12.2.1.1_r123268_v12_x_1-ubuntu-22.04-linux-x86_64.sh
5e4ba7a2574ca30ad364c21cf46ef5f2guard-stap-12.2.1.1_r123268_v12_x_1-ubuntu-24.04-linux-s390x.sh
791f66b4d6e9d7c4a6418c6ac99ccbbbguard-stap-12.2.1.1_r123268_v12_x_1-ubuntu-24.04-linux-x86_64.sh
c61667cbff9e2e9e05582699fb0898fcguard-stap-12.2.1.1_r123268_v12_x_1-ubuntu.sh
2ecb6587074efc4dddd053a41a3feb31guard-stap-12.2.1.1_r123268_v12_x_1-zlinux.sh
90d667cbef32cc526f69ca64fd1de86dktaposmatch.csv
877c11fdb5a8e47a0b9aaa9fafa1c002modules-12.2.1.1_r123268_v12_x_1.tgz
 
 
Related Guardium updates
 
  • Guardium Data Protection 12.2.1 (see release notes)
  • Guardium Data Protection Linux-UNIX CAS 12.2.1.0 r122289 (see release notes)
  • Guardium Data Protection Linux-UNIX GIM 12.2.1.0 r122289 (see release notes)
 
 

[{"Type":"MASTER","Line of Business":{"code":"LOB76","label":"Data Platform"},"Business Unit":{"code":"BU048","label":"IBM Software"},"Product":{"code":"SSMPHH","label":"IBM Security Guardium"},"ARM Category":[{"code":"a8m3p000000PCTuAAO","label":"Platform\/Installation\/Deployment"},{"code":"a8m0z000000Gp0IAAS","label":"STAP"}],"ARM Case Number":"","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF016","label":"Linux"},{"code":"PF027","label":"Solaris"}],"Version":"12.2.0"}]

Document Information

Modified date:
31 March 2026

UID

ibm17262435