IBM Support

Release of Guardium Data Protection Linux-UNIX S-TAP 12.1.4.0 r123502

Release Notes


Abstract

This technical note provides guidance for installing IBM Guardium Data Protection Linux and UNIX Agents 12.1.4.0 r123502, including any new features or enhancements, resolved or known issues, or notices associated with the patch.

Content

Patch information
Product:IBM Guardium
Release version:Guardium 12.1 Linux-UNIX Software TAP (S-TAP)
Completion date:31 March 2026

 

 
Fix IDs
Guardium_12.1.4.0_S-TAP_AIX_r123502
Guardium_12.1.4.0_S-TAP_Amazon_r123502
Guardium_12.1.4.0_S-TAP_Debian_r123502
Guardium_12.1.4.0_S-TAP_Modules_r123502
Guardium_12.1.4.0_S-TAP_RedHat_r123502
Guardium_12.1.4.0_S-TAP_Solaris_r123502
Guardium_12.1.4.0_S-TAP_Suse_r123502
Guardium_12.1.4.0_S-TAP_Ubuntu_r123502
Guardium_12.1.4.0_S-TAP_zLinux_r123502

 

 
Finding the patch
  1. Select the following options to download this patch on the IBM Fix Central website and click Continue.
    • Product selector: IBM Security Guardium
    • Installed Version: 12.1
    • Platform: AIX, Linux, or Solaris
  2. On the "Identify fixes" page, select Browse for fixes and click Continue.
  3. On the "Select fixes" page, select Database Agent (STAP, GIM and CAS). Then, enter the patch information in the Filter fix details field to locate the patch.
 
When to reboot after installing or upgrading to Guardium 12.1 Linux-UNIX S-TAP
 
To view full traffic, certain databases must be restarted after you upgrade to Guardium 12.1 from the following S-TAP versions.  You must stop your database before you upgrade, or restart the database after you upgrade if traffic stopped capturing. The affected S-TAP versions are:
 
  • STAP-11.5.4.1_r115368_1
  • STAP-12.0.0.0_r115418_v12_0_1
 
 
 
Attention
 
This patch is a replacement for Linux-UNIX S-TAP 12.1.3.0_r122091
This patch fixes an issue in the previously released patch Linux-UNIX S-TAP 12.1.3.0_r122091 that might cause kernel memory leaks leading to instability on database servers. Installing this updated S‑TAP patch will stop all new memory leaks, but it will not release memory that was already leaked under the affected versions. Therefore, IBM strongly recommends rebooting the server after upgrading to ensure all previously leaked and unrecoverable kernel memory is cleared. A full reboot is required at your earliest convenience to return the system to a known‑good state. For more information, see Linux-UNIX S-TAP 12.1.3.0_r122091_1 and 12.2.1.0_r122289 might cause kernel memory leaks.  
 
 
Deprecated platform and database support
 
AIX 7.1 TL5 and AIX 7.2 TL4
IBM Guardium ends the support for AIX 7.1 TL5 and AIX 7.2 TL4 systems because it reached end of life. This is effective for all Guardium versions 11.4, 11.5, and 12.0, and upcoming versions released starting September 2024 for AIX 7.1 TL5 and AIX 7.2 TL4. No Guardium features such as Database Activity Monitoring, Classification, or Vulnerability Assessment will be supported on these platforms and versions after the dates provided. For more information, see IBM Guardium support discontinuance notification for AIX 7.1 TL5 and AIX 7.2 TL4.
 
 
Debian 9 and 10
IBM Guardium ends the support for Debian 9 and 10 systems because it reached end of life. No Guardium features, such as Database Activity Monitoring, Classification, or Vulnerability Assessment will be supported after the following dates:
  • For Debian 9, this is effective for all Guardium versions 11.4, 11.5, and 12.0, and upcoming versions released starting July 2024.
  • For Debian 10, this is effective for all Guardium versions 11.4, 11.5, and 12.0, and upcoming versions released starting August 2024.
 
 
HP-UX 11.31 ia64 
IBM Guardium ends the support for HP-UX 11.31 ia 64 systems starting with Guardium 12.0. No Guardium features such as Database Activity Monitoring, Classification, or Vulnerability Assessment will be supported on the platform and version. For more information, see IBM Guardium support discontinuance notification for HP-UX 11.31 ia64.
 
 
Red Hat 6 
IBM Guardium ends the support for Red Hat 6 systems because it reached end of life. This is effective for all Guardium versions 11.4 and newer released after 1 June 2024. For more information, see IBM Guardium support discontinuance notification for Red Hat 6
 
 
SUSE 11
IBM Guardium ends the support for all versions of SUSE 11 systems because it reached end of life. This is effective for all Guardium versions 11.4, 11.5, and 12.0, and upcoming versions released starting September 2024 for all versions of SUSE 11. No Guardium features such as Database Activity Monitoring, Classification, or Vulnerability Assessment will be supported on the platforms and versions after the dates provided. For more information, see IBM Guardium support discontinuance notification for SUSE 11.
 
 
Ubuntu 14
IBM Guardium ends the support for Ubuntu 14 systems because it reached end of life. This is effective for all Guardium versions 11.4, 11.5, and 12.0 starting July 2024. No IBM Guardium features such as Database Activity Monitoring, Classification or Vulnerability Assessment will be supported on the platforms and versions after the dates provided. For more information, see IBM Guardium support discontinuance notification for Ubuntu 14.
 
 
New support and functionality
 
  • Added Guardium load balancing support for Oracle ASO traffic
  • Added support for Red Hat Enterprise Linux 9.7 x86_64
  • Added support for SUSE Linux Enterprise Server 15 SP7
 
 
Resolved issues
Patch
Issue keySummaryKnown Issue (APAR)
12.1.2.1 r119768
 
See release note for patch 12.1.2.1 r119768
 
12.1.4.0 r123502
GRD-89066
Improved S-TAP diags to improve and facilitate investigation.
 
 GRD-94437Fixed an issue where missing traffic with DB2 EXIT if DB2_HOME environment variable has a trailing forward slash ('/') character at the end of the pathDT446848
 GRD-95241Modified query for OUA to avoid invalid data convergence in some corner casesDT448770
 GRD-100561Fixed an issue where S-TAP Discovery cannot find enterprise Postgres db in edb-postmaster environmentDT442977
 GRD-101013Added support for kernel 6.4.0-150600.23.33-default.ppc64leDT454880
 GRD-101884Update configuration to disable db_request_handler_enable/atap_request_handler_enable, and using nocopy for oracle SSL encryption and ASO init and free context.DT443066
 GRD-102626Fixed an issue where kernel crash by Kernel TAP (K-TAP) on Solaris 5.11DT448727
 GRD-102827Added support for kernel 6.11.0-26-generic Ubuntu 24.04.1DT446504
 GRD-104808Fixed an issue where S-TAP continuously writes logs to db2diag when db2exit is enabled and debug log level is set to 10 
 GRD-104989Fixed an issue where MongoDBv7.0.15 with Application TAP (A-TAP) enabled is not generating extrusion alertsDT448174
 GRD-105345Fixed a connection issue when balancing is in FAILOVER modeDT448659
 GRD-105884Added support for kernel 5.14.0-570.25.1.el9_6.s390x Red Hat Enterprise Linux 9.6 (Plow) v12.1DT448777
 GRD-106542Fixed a race condition that resulted in server instability upon S-TAP startDT448711
 GRD-109374Added support for client_ip for A-TAP Oracle Advanced Security Option (ASO) traffic with S-TAP load balancing enabledDT457531
 
GRD-109438
Priority packets are disabled by default when an Exit connection is configured in order to improve exit performance and reduce packet drops. To re-enable priority packets, a hidden parameter, ignore_pp_for_exit, can be set in guard_tap.ini.DT458322
 GRD-110754Added delay and a buffer readiness check before launching ktap_reader thread to address potential kernel panic when ring buffers are enabled and participate_in_load_balancing is updatedDT455613
 
GRD-111348
Added support for kernel 6.12.0-103.40.4.2.el9uek.x86_64DT457633
 GRD-111628Added support for kernel 6.12.0-102.36.5.2.el9uek.x86_64 Oracle Linux 9DT457570
 GRD-111999Resolved an issue where the collector did not receive any traffic from all UNIX S-TAPs with sniffer patch 12.0p4012 and later.DT454959
 GRD-120975Fixed an issue that might cause kernel memory leaks leading to instability on database servers. For more information, see Linux-UNIX S-TAP 12.1.3.0_r122091_1 and 12.2.1.0_r122289 might cause kernel memory leaks

Important post-upgrade requirement 
Installing this S-TAP update will stop all new memory leaks, but it will not release memory that was already leaked under the affected versions. Therefore, IBM strongly recommends rebooting the server after upgrading to ensure all previously leaked and unrecoverable kernel memory is cleared. A full reboot is required at your earliest convenience to return the system to a known-good state.
DT465441
 GRD-121315Fixed S‑TAP instability during Guardium Installation Manager (GIM) upgrades with the global session key enabled. 
 GRD-121381Fixed an issue that occurred when the global session key was enabled, where saving priority packets could run out of space and impact S‑TAP stability. 
 
 
Installers with MD5Sums

 

MD5SumFile Name     
b393223d5c8d77fc7e0a141ba2c8537eguard-bundle-STAP-12.1.4.0_r123502_v12_1_1-aix-7.2-aix-powerpc.gim
018f7225fd6834ec6620d4c3885130efguard-bundle-STAP-12.1.4.0_r123502_v12_1_1-aix-7.2-aix-powerpc.gim.sh
c1d403f8341829a552a2b5121a3e4947guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-aix-7.3-aix-powerpc.gim
23ad591cb453ba0f3e2b28fd6b8f550eguard-bundle-STAP-12.1.4.0_r123502_v12_1_1-aix-7.3-aix-powerpc.gim.sh
1371b74ada65c3f45f218d6a843d4fcdguard-bundle-STAP-12.1.4.0_r123502_v12_1_1-amzn-2023-linux-aarch64.gim
938e9427252f1acb423242e16cd1fb06guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-amzn-2023-linux-aarch64.gim.sh
d737bf61bee322c64336b4608c38eceeguard-bundle-STAP-12.1.4.0_r123502_v12_1_1-amzn-2023-linux-x86_64.gim
49fb2c56db196cb959a6d76f956b661bguard-bundle-STAP-12.1.4.0_r123502_v12_1_1-amzn-2023-linux-x86_64.gim.sh
4878b3ad061f49e976d9a1c7116923f5guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-amzn-2-linux-aarch64.gim
ee9e38a38030578f1b2a06993046b252guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-amzn-2-linux-aarch64.gim.sh
634e6882a947378a5c04a60cec649e32guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-amzn-2-linux-x86_64.gim
7de5873aa41704895bb2c46d827fb954guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-amzn-2-linux-x86_64.gim.sh
2395f0042372502b810b9421a3044d4fguard-bundle-STAP-12.1.4.0_r123502_v12_1_1-debian-11-linux-x86_64.gim
1cbe06e8c28d6ef2a2e5c8000f4974d7guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-debian-11-linux-x86_64.gim.sh
ddcecaa5e5ddd861c6bf9f2dcf381e57guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-debian-12-linux-x86_64.gim
053f8c8b69b3ba20732017cbf870dc43guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-debian-12-linux-x86_64.gim.sh
a98ceb752e7ededbc25a5073cb7e113cguard-bundle-STAP-12.1.4.0_r123502_v12_1_1-rhel-7-linux-ppc64.gim
b877751a5ecfd1e1c2aa46a2f0e38de3guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-rhel-7-linux-ppc64.gim.sh
fc9952d52cf7ef282fb9bbb68395778dguard-bundle-STAP-12.1.4.0_r123502_v12_1_1-rhel-7-linux-ppc64le.gim
c6555716420b5f5711b2255cb1d01891guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-rhel-7-linux-ppc64le.gim.sh
ac0933d376880eee64df85b42f1e748fguard-bundle-STAP-12.1.4.0_r123502_v12_1_1-rhel-7-linux-s390x.gim
0aa90794cffd6dd9f6d4fb3dd7761e6cguard-bundle-STAP-12.1.4.0_r123502_v12_1_1-rhel-7-linux-s390x.gim.sh
802af2e3de3310241fb3956882395773guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-rhel-7-linux-x86_64.gim
8378214a9947596a731d23a8813959fdguard-bundle-STAP-12.1.4.0_r123502_v12_1_1-rhel-7-linux-x86_64.gim.sh
03d8e77f6efe5d70f9086ca5b234d5e2guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-rhel-8-linux-ppc64le.gim
e9224f03b480486197d70419d0b6151eguard-bundle-STAP-12.1.4.0_r123502_v12_1_1-rhel-8-linux-ppc64le.gim.sh
8c3fd6cf031bf1db5a89a974b2266410guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-rhel-8-linux-s390x.gim
e1f2aaa66f6136ebd72b2e9da178e32bguard-bundle-STAP-12.1.4.0_r123502_v12_1_1-rhel-8-linux-s390x.gim.sh
3fd4858e289f8a3a2df01c009ab7dfffguard-bundle-STAP-12.1.4.0_r123502_v12_1_1-rhel-8-linux-x86_64.gim
5cbd5ab14f927600af87246ca923d5beguard-bundle-STAP-12.1.4.0_r123502_v12_1_1-rhel-8-linux-x86_64.gim.sh
b9a5443e162ac335f808b0888549a510guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-rhel-9-linux-ppc64le.gim
170445d94b32b3edccc06b3821bbe345guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-rhel-9-linux-ppc64le.gim.sh
a1ab0ff8d18ac3a5f81f228a62810370guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-rhel-9-linux-s390x.gim
091682cace59331f1fe501331eb97466guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-rhel-9-linux-s390x.gim.sh
aeeff81b76e37bcad1fbf17c22dbd79fguard-bundle-STAP-12.1.4.0_r123502_v12_1_1-rhel-9-linux-x86_64.gim
deab2d085085ab1cc2daa916253c4ad3guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-rhel-9-linux-x86_64.gim.sh
d3a16be5b9b921fda9b94285e4e73e69guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-sunos-5.10-solaris-i386_64.gim
6da893f1db1f6e61ee8d7a3f9fbefffaguard-bundle-STAP-12.1.4.0_r123502_v12_1_1-sunos-5.10-solaris-i386_64.gim.sh
6e2094af88d9a755f224c2c66e8f3729guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-sunos-5.10-solaris-sparc.gim
0f2f9c89886b6d5280e739734e82f11fguard-bundle-STAP-12.1.4.0_r123502_v12_1_1-sunos-5.10-solaris-sparc.gim.sh
36b376136e642686ea0455e96aebbc02guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-sunos-5.11-solaris-i386_64.gim
603705783823484131683887a292a437guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-sunos-5.11-solaris-i386_64.gim.sh
43defca4ae5af865a5d5efb7d054ffdbguard-bundle-STAP-12.1.4.0_r123502_v12_1_1-sunos-5.11-solaris-sparc.gim
5928d005abcf39e552afb1a692ef0e29guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-sunos-5.11-solaris-sparc.gim.sh
79399c0079b7b17d2b746a377c111aafguard-bundle-STAP-12.1.4.0_r123502_v12_1_1-suse-12-linux-ppc64le.gim
604022f33a63a8d3e8f09482d1c7c184guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-suse-12-linux-ppc64le.gim.sh
6dca1a58bfc14f4bf216c0f52026f481guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-suse-12-linux-s390x.gim
1090e9b42c0eb35a4dffd11a499c1054guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-suse-12-linux-s390x.gim.sh
706baf43e67ee47795be1c17dbf72f56guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-suse-12-linux-x86_64.gim
d2bb2e207350cda203bdb94bd2a8b2b0guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-suse-12-linux-x86_64.gim.sh
d7388f72f7262b3481514e25213ddab6guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-suse-15-linux-ppc64le.gim
4237ca2fba5eec23ccd12fbaaccab189guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-suse-15-linux-ppc64le.gim.sh
08ab968da3c613e4fd85c285ed3ac980guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-suse-15-linux-s390x.gim
02ba52f3fa8615f486d0a6507184fbc2guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-suse-15-linux-s390x.gim.sh
15af68b5514b3b9260778f0cd3964710guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-suse-15-linux-x86_64.gim
a926c47c7a8dc11bc736848d593f9bf8guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-suse-15-linux-x86_64.gim.sh
301fba703367602fe3645791662531e2guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-ubuntu-16.04-linux-x86_64.gim
9f16d6fe63d851cc44a38f229ffe992dguard-bundle-STAP-12.1.4.0_r123502_v12_1_1-ubuntu-16.04-linux-x86_64.gim.sh
dab5aff4395f4befd221cceb5adbe09fguard-bundle-STAP-12.1.4.0_r123502_v12_1_1-ubuntu-18.04-linux-s390x.gim
229b78a1b8abe942325626dde6baee40guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-ubuntu-18.04-linux-s390x.gim.sh
7f1ebe7e2d4920bd441b2c2af98be39bguard-bundle-STAP-12.1.4.0_r123502_v12_1_1-ubuntu-18.04-linux-x86_64.gim
e443fbdcc5af37aee0d67d52e28a516dguard-bundle-STAP-12.1.4.0_r123502_v12_1_1-ubuntu-18.04-linux-x86_64.gim.sh
f264a770ad4dea1b6827be6c526c8b28guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-ubuntu-20.04-linux-s390x.gim
dd0e03bd596ca68dec01275bbf0ef73cguard-bundle-STAP-12.1.4.0_r123502_v12_1_1-ubuntu-20.04-linux-s390x.gim.sh
06d96fa4d5cdacd3ae9a651e79293d39guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-ubuntu-20.04-linux-x86_64.gim
904c110f1adead85928fdb52cda9b827guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-ubuntu-20.04-linux-x86_64.gim.sh
9efde8500cfdefb18c32db6405f7c868guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-ubuntu-22.04-linux-s390x.gim
6c050009b4ad3197116e8eaa8fbcf988guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-ubuntu-22.04-linux-s390x.gim.sh
046799f8b41ec9f7597e00661e094d10guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-ubuntu-22.04-linux-x86_64.gim
1bdcf751eba17fffaa3449f6df9ceea5guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-ubuntu-22.04-linux-x86_64.gim.sh
68d70bfdf430f3f60af0df5f62c295c2guard-bundle-STAP-12.1.4.0_r123502_v12_1_1-ubuntu-24.04-linux-s390x.gim
49164fd209ed3303f1698c70a1380a3bguard-bundle-STAP-12.1.4.0_r123502_v12_1_1-ubuntu-24.04-linux-s390x.gim.sh
a27d6202d2bff39a7f3f2dbc844a97fdguard-bundle-STAP-12.1.4.0_r123502_v12_1_1-ubuntu-24.04-linux-x86_64.gim
9e41b570708739e5a5fa5c7a8415236bguard-bundle-STAP-12.1.4.0_r123502_v12_1_1-ubuntu-24.04-linux-x86_64.gim.sh
b28e78d9c1d501094498550d7cd12d86guardium_module_signing.der   
77746cd1b3c117f03d760aa7f3721fbdguardium_module_signing_suse15.der  
ef156550841ec9f7b079a3b2a0acf02eguard-stap-12.1.4.0.123502-1-amzn-2023-linux-aarch64.aarch64.rpm
ef358f08c4a7418521b79e1c97c191a3guard-stap-12.1.4.0.123502-1-amzn-2023-linux-x86_64.x86_64.rpm
6bf3ef1bff454c558f4454eac31ff9adguard-stap-12.1.4.0.123502-1-amzn-2-linux-aarch64.aarch64.rpm
a74b1cc3bf4a1922ff6ec9a6e42b0fcaguard-stap-12.1.4.0.123502-1-amzn-2-linux-x86_64.x86_64.rpm
d5b3e6e544c71a4ffd623d8340234a39guard-stap-12.1.4.0.123502-1-rhel-7-linux-ppc64le.ppc64le.rpm
ee2b68fcc4fd381115bb62f8fc221cd9guard-stap-12.1.4.0.123502-1-rhel-7-linux-ppc64.ppc64.rpm
4f653b578fb4fe286f92926366c7c568guard-stap-12.1.4.0.123502-1-rhel-7-linux-s390x.s390x.rpm
ea23ee4ddcde239635309e40c566236eguard-stap-12.1.4.0.123502-1-rhel-7-linux-x86_64.x86_64.rpm
fee5945416dc9ca7ca8b3839f68fc3f3guard-stap-12.1.4.0.123502-1-rhel-8-linux-ppc64le.ppc64le.rpm
915f7bad92681e386960b9318e53f256guard-stap-12.1.4.0.123502-1-rhel-8-linux-s390x.s390x.rpm
2650c5498bbdcbf2f5d516b95b1c6582guard-stap-12.1.4.0.123502-1-rhel-8-linux-x86_64.x86_64.rpm
f97874858d42a43ae185a56592376a81guard-stap-12.1.4.0.123502-1-rhel-9-linux-ppc64le.ppc64le.rpm
a558d613d062ec37a4eb1a1cbad7ca00guard-stap-12.1.4.0.123502-1-rhel-9-linux-s390x.s390x.rpm
9195a5fdef79838231fad9093aaf89d4guard-stap-12.1.4.0.123502-1-rhel-9-linux-x86_64.x86_64.rpm
fc34787a3a6284578a511fe59cd49a56guard-stap-12.1.4.0.123502-1-suse-12-linux-ppc64le.ppc64le.rpm
37234ca553af1905f7192c4d51cfec8dguard-stap-12.1.4.0.123502-1-suse-12-linux-s390x.s390x.rpm
e5299a8410c525a5b546a1af0dbcc03aguard-stap-12.1.4.0.123502-1-suse-12-linux-x86_64.x86_64.rpm
8ce69463abc73cea680f9afdadcddb9aguard-stap-12.1.4.0.123502-1-suse-15-linux-ppc64le.ppc64le.rpm
ceed1fe1e295e17718b21b902d7012b5guard-stap-12.1.4.0.123502-1-suse-15-linux-s390x.s390x.rpm
e75581c8663cdc4ddaf1cb2ca59c6534guard-stap-12.1.4.0.123502-1-suse-15-linux-x86_64.x86_64.rpm
77e18b160bcce9b4a637a097cffdd7cbguard-stap-12.1.4.0_r123502_v12_1_1-aix-7-aix-powerpc.sh
a6bc759459545af8a969a0c944bd3fffguard-stap-12.1.4.0_r123502_v12_1_1-aix.sh  
bb23617c0a25b3928ef8eab3a7ac83aeguard-stap-12.1.4.0_r123502_v12_1_1-amzn-2023-linux-aarch64.sh
bf46945403834622863f75274b7f4884guard-stap-12.1.4.0_r123502_v12_1_1-amzn-2023-linux-x86_64.sh
5152b59f7fa6dc9ef1c402b5e0230114guard-stap-12.1.4.0_r123502_v12_1_1-amzn-2-linux-aarch64.sh
40b39ac2782d49e59625224ca7ae02cbguard-stap-12.1.4.0_r123502_v12_1_1-amzn-2-linux-x86_64.sh
9f16fde2e601956173802044304809afguard-stap-12.1.4.0_r123502_v12_1_1-amzn.sh 
e8bd3a70df8028da3b32f1c60d3090f1guard-stap-12.1.4.0_r123502_v12_1_1-debian-11-linux-x86_64.sh
c68e4f2caf97ddb1c02414ad98736d4bguard-stap-12.1.4.0_r123502_v12_1_1-debian-12-linux-x86_64.sh
85b4bbd58831a328241b3864f98e0174guard-stap-12.1.4.0_r123502_v12_1_1-debian.sh 
57f13126b72bbddcb8c93fa52c80bd7bguard-stap-12.1.4.0_r123502_v12_1_1-rhel-7-linux-ppc64le.sh
3bb579137fa5f754c289a267af4805e1guard-stap-12.1.4.0_r123502_v12_1_1-rhel-7-linux-ppc64.sh
5c1ce7402eb70840f56de2e62173a2d1guard-stap-12.1.4.0_r123502_v12_1_1-rhel-7-linux-s390x.sh
63e564e76099135626f2db5f3e06d805guard-stap-12.1.4.0_r123502_v12_1_1-rhel-7-linux-x86_64.sh
fcddc998b001780331ef1b9fe46d58f3guard-stap-12.1.4.0_r123502_v12_1_1-rhel-8-linux-ppc64le.sh
0100e1d180b3d4598d0e096edd0bbb8cguard-stap-12.1.4.0_r123502_v12_1_1-rhel-8-linux-s390x.sh
136cb5257709014e1c65ca2ba443beb3guard-stap-12.1.4.0_r123502_v12_1_1-rhel-8-linux-x86_64.sh
fba083f156c4f19aaed5df58b8d175d3guard-stap-12.1.4.0_r123502_v12_1_1-rhel-9-linux-ppc64le.sh
6a9fb646b0a508c4bf410e46593819b6guard-stap-12.1.4.0_r123502_v12_1_1-rhel-9-linux-s390x.sh
691b312f2340f8616cac30e6c2888828guard-stap-12.1.4.0_r123502_v12_1_1-rhel-9-linux-x86_64.sh
b2dab380ba171fc262929a85389c7e8bguard-stap-12.1.4.0_r123502_v12_1_1-rhel.sh 
e9fa84fb324a11aa0ba341606e7e60c7guard-stap-12.1.4.0_r123502_v12_1_1-solaris.sh 
81009decb7252ae2f57e8d313a8d0125guard-stap-12.1.4.0_r123502_v12_1_1-sunos-5.10-solaris-i386_64.sh
047d9ae06cbccb206a799e1e8db352e8guard-stap-12.1.4.0_r123502_v12_1_1-sunos-5.10-solaris-sparc.sh
6df658fe757653dad1ef0cf72f38571aguard-stap-12.1.4.0_r123502_v12_1_1-sunos-5.11-solaris-i386_64.sh
44163f93c20e9994eec700e16a9d3c94guard-stap-12.1.4.0_r123502_v12_1_1-sunos-5.11-solaris-sparc.sh
3d8a0790846182df52ead5d0cf59ce01guard-stap-12.1.4.0_r123502_v12_1_1-suse-12-linux-ppc64le.sh
135b344c82f38239451723537af99233guard-stap-12.1.4.0_r123502_v12_1_1-suse-12-linux-s390x.sh
975567d9c7d2cf913234b46d68f9987aguard-stap-12.1.4.0_r123502_v12_1_1-suse-12-linux-x86_64.sh
f650b50f40cc88ac47e694d4630991e7guard-stap-12.1.4.0_r123502_v12_1_1-suse-15-linux-ppc64le.sh
4fa712edd480a2b6e91c8cc5d2fe8e4dguard-stap-12.1.4.0_r123502_v12_1_1-suse-15-linux-s390x.sh
8e8a6a463bfd4e863db86a9ea1927ddeguard-stap-12.1.4.0_r123502_v12_1_1-suse-15-linux-x86_64.sh
4dbf79bfd9b2bbf4851be86b61918234guard-stap-12.1.4.0_r123502_v12_1_1-suse.sh 
ccb5d10ff2ccdf096f5e955065858f5eguard-stap-12.1.4.0_r123502_v12_1_1-ubuntu-16.04-linux-x86_64.sh
d75f5d4bbd429fee99af0ea284d069f9guard-stap-12.1.4.0_r123502_v12_1_1-ubuntu-18.04-linux-s390x.sh
3228da899cb41c66e28b3e92b39d2788guard-stap-12.1.4.0_r123502_v12_1_1-ubuntu-18.04-linux-x86_64.sh
d32899eb2ed0b8ecab7fdf6a4abcd1fcguard-stap-12.1.4.0_r123502_v12_1_1-ubuntu-20.04-linux-s390x.sh
fa4f7086c9cdf11b1e2c040ca5e0d5b3guard-stap-12.1.4.0_r123502_v12_1_1-ubuntu-20.04-linux-x86_64.sh
ca5a523a2c2a19512340c6814323f07dguard-stap-12.1.4.0_r123502_v12_1_1-ubuntu-22.04-linux-s390x.sh
8cab7aaf0a5cc0ae35c576dd1baf4d82guard-stap-12.1.4.0_r123502_v12_1_1-ubuntu-22.04-linux-x86_64.sh
d94cb53211eba265b1f7fd9fe6877841guard-stap-12.1.4.0_r123502_v12_1_1-ubuntu-24.04-linux-s390x.sh
ef49ee4658c30855e81756509c523dc0guard-stap-12.1.4.0_r123502_v12_1_1-ubuntu-24.04-linux-x86_64.sh
c9d128b9e79ceccd1be8a53a59de3445guard-stap-12.1.4.0_r123502_v12_1_1-ubuntu.sh 
c01e8a136008b364a17a7427bc4fb59eguard-stap-12.1.4.0_r123502_v12_1_1-zlinux.sh 
d7204947040601a04367373e9e0bd6a0ktaposmatch.csv    
368412f4c32f80fc72631a3493168952modules-12.1.4.0_r123502_v12_1_1.tgz  
 
 
Related Guardium updates
Guardium Data Protection Linux-UNIX GIM 12.1.4.0 r123502 (see release note)
 

[{"Type":"MASTER","Line of Business":{"code":"LOB76","label":"Data Platform"},"Business Unit":{"code":"BU048","label":"IBM Software"},"Product":{"code":"SSMPHH","label":"IBM Security Guardium"},"ARM Category":[{"code":"a8m3p000000PCTuAAO","label":"Platform\/Installation\/Deployment"},{"code":"a8m0z000000Gp0IAAS","label":"STAP"}],"ARM Case Number":"","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF016","label":"Linux"},{"code":"PF027","label":"Solaris"}],"Version":"12.1.0"}]

Document Information

Modified date:
08 April 2026

UID

ibm17267447