Release Notes
Abstract
This document lists the quarterly updates for IBM Guardium Database Protection Service (DPS). The IBM Guardium team develops vulnerability assessment tests on a quarterly basis for all newly released database vendor versions and patches, Common Vulnerabilities and Exposures (CVE) records, known issues (APARs) for IBM Db2 for z/OS and IBM iSeries, and predefined groups.
Content
This document is intended for Guardium Data Protection and Guardium Vulnerability Assessment version 11.x and 12.x clients. DPS updates are separate from Guardium Data Protection patch updates (GPU) and bundle patches. Update your Guardium system with the latest DPS patch file available on IBM Support Fix Central to keep your vulnerability assessment tests current with industry best practices and help protect against newly discovered vulnerabilities. The latest Quarterly DPS patch contains all previous DPS update data for its major version (11.x or 12.x). For more information, see Installing IBM Guardium Database Protection Service updates.
Note: DPS only covers CVE related to database servers. CVE related to applications that use the database server are out of scope. CVE with a Common Vulnerability Scoring System (CVSS) score of 7 or higher trigger a rapid response workflow and new tests are released within 5-7 business days through ad hoc Rapid Response DPS updates on Fix Central.
Version | Requirements |
|---|---|
11.x | There are no specific requirements for loading the quarterly DPS release on Guardium version 11.x. |
12.x | There are no specific requirements for loading the quarterly DPS release on Guardium version 12.x. |
| Version | Filename and MD5SUM |
|---|---|
| 11.x | Filename: Guardium_V11_Quarterly_DPS_2026_Q2_20260515.enc MD5SUM: 36b6e13b1292cd6c82764f35c61d40c1 |
| 12.x | Filename: Guardium_V12_Quarterly_DPS_2026_Q2_20260515.enc MD5SUM: e244dd48d5dd6c9d06f850679ffcb970 |
Database | Version 11.x | Version 12.x |
|---|---|---|
| DB2 Database | 12.1+Fix Pack "4.0", s2602211313, O | 12.1+Fix Pack "4.0", s2602211313, O |
| Microsoft SQL Server Database | 17.0+4035 16.0+4250 15.0+4465 14.0+3525 13.0+7080 | 17.0+4035 16.0+4250 15.0+4465 14.0+3525 13.0+7080 |
MySQL Database | 9.7+0* 8.4+9* 8.0+46* | 9.7+0* 8.4+9* 8.0+46* |
Oracle Database | 23+RU 23.26.2.0.0 21+RU 21.22.0.0.260421 19+RU 19.31.0.0.260421 | 23+RU 23.26.2.0.0 21+RU 21.22.0.0.260421 19+RU 19.31.0.0.260421 |
Sybase Database | 16.1+00.02 | 16.1+00.02 |
Teradata PDE | 20.00.24+66 17.20.03+50 | 20.00.24+66 17.20.03+50 |
Teradata TDBMS | 20.00.24+66 17.20.03+50 | 20.00.24+66 17.20.03+50 |
Teradata TDGSS | 20.00.24+66 17.20.03+50 | 20.00.24+66 17.20.03+50 |
Teradata TGTW | 20.00.24+66 17.20.03+50 | 20.00.24+66 17.20.03+50 |
Postgres | 14.22+0* 15.17+0* 16.13+0* 17.9+0* 18.3+0* | 14.22+0* 15.17+0* 16.13+0* 17.9+0* 18.3+0* |
MongoDB Database | 7.0+31 8.0+20 8.2+7 | 7.0+31 8.0+20 8.2+7 |
SAP Hana Database | 2.00+89 | 2.00+89 |
Cloudera Hadoop | 7.3+2 7.3+1.p706 7.1+9.p1078 | 7.3+2 7.3+1.p706 7.1+9.p1078 |
Cloudera Manager | 7.13+2 | 7.13+2 |
DataStax Cassandra DSE | 5.1+50 6.8+63 6.9+21 | 5.1+50 6.8+63 6.9+21 |
DB2 LUW Database Special Security Fixes | 12.1+3.0, special_74153, O 11.5+9.0, special_75854, O 11.5+9.0, special_79671, O 12.1+4.0, special_80714, O | 12.1+3.0, special_74153, O 11.5+9.0, special_75854, O 11.5+9.0, special_79671, O 12.1+4.0, special_80714, O |
Couchbase | 8.0+1 7.6+11 | 8.0+1 7.6+11 |
Neo4j | 2026.01+4 2026.02+3 2026.03+1 2026.04+0 5.26+25 | 2026.01+4 2026.02+3 2026.03+1 2026.04+0 5.26+25 |
MariaDB | 11.8+6 11.4+10 10.6+25 | 11.8+6 11.4+10 10.6+25 |
Percona MySQL | 8.4+8 8.0+45 | 8.4+8 8.0+45 |
Apache Cassandra | 5.0+8 4.1+11 4.0+20 | 5.0+8 4.1+11 4.0+20 |
EDB Postgres | 18.3+0* 18.2+0* 17.9+0* 17.8+0* 16.13+0* 16.12+0* 15.17+0* 15.16+0* 14.22+0* 14.21+0* | |
CockroachDB | 23.2+30 24.1+28 24.3+31 25.2+17 25.4+9 26.1+3 | |
MarkLogic | 12.0+0 11.3+3 |
| Versions | Test ID | Description | Database type | What changed? |
|---|---|---|---|---|
| 11.x, 12.x | -- | -- | -- | -- |
| Versions | Test ID | Description | Database type | What changed? |
|---|---|---|---|---|
| 11.x, 12.x | -- | -- | -- | -- |
| Versions | ID | Name type | New or updated items | What changed? |
|---|---|---|---|---|
| 11.x, 12.x | -- | -- | -- | -- |
| Versions | Test name | Database type | CVE score |
|---|---|---|---|
| 11.x, 12.x | CVE-2026-34312 | ORACLE | 2.4 |
| 11.x, 12.x | CVE-2026-35229 | ORACLE | 7.5 |
| 11.x, 12.x | CVE-2025-13867 | DB2 | 6.5 |
| 11.x, 12.x | CVE-2025-14688 | DB2 | 5.3 |
| 11.x, 12.x | CVE-2025-14689 | DB2 | 6.5 |
| 11.x, 12.x | CVE-2025-36009 | DB2 | 6.5 |
| 11.x, 12.x | CVE-2025-36122 | DB2 | 6.5 |
| 11.x, 12.x | CVE-2025-36424 | DB2 | 6.5 |
| 11.x, 12.x | CVE-2025-36425 | DB2 | 6.5 |
| 11.x, 12.x | CVE-2025-36427 | DB2 | 6.5 |
| 11.x, 12.x | CVE-2026-1352 | DB2 | 6.5 |
| 11.x, 12.x | CVE-2026-1577 | DB2 | 6.5 |
| 11.x, 12.x | CVE-2026-21998 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2026-22001 | MYSQL | 2.7 |
| 11.x, 12.x | CVE-2026-22002 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2026-22004 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2026-22005 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2026-22009 | MYSQL | 6.5 |
| 11.x, 12.x | CVE-2026-22015 | MYSQL | 4.3 |
| 11.x, 12.x | CVE-2026-22017 | MYSQL | 6.5 |
| 11.x, 12.x | CVE-2026-34267 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2026-34270 | MYSQL | 6.5 |
| 11.x, 12.x | CVE-2026-34271 | MYSQL | 6.5 |
| 11.x, 12.x | CVE-2026-34272 | MYSQL | 6.5 |
| 11.x, 12.x | CVE-2026-34276 | MYSQL | 6.5 |
| 11.x, 12.x | CVE-2026-34278 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2026-34293 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2026-34303 | MYSQL | 6.5 |
| 11.x, 12.x | CVE-2026-34304 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2026-34308 | MYSQL | 6.5 |
| 11.x, 12.x | CVE-2026-34317 | MYSQL | 5 |
| 11.x, 12.x | CVE-2026-34318 | MYSQL | 5.8 |
| 11.x, 12.x | CVE-2026-34319 | MYSQL | 5 |
| 11.x, 12.x | CVE-2026-35234 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2026-35235 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2026-35236 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2026-35237 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2026-35238 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2026-35239 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2026-35240 | MYSQL | 4.9 |
| 11.x, 12.x | CVE-2026-2003 | POSTGRESQL | 4.3 |
| 11.x, 12.x | CVE-2026-25609 | MONGODB | 4.3 |
| 11.x, 12.x | CVE-2026-25610 | MONGODB | 6.5 |
| 11.x, 12.x | CVE-2026-25613 | MONGODB | 6.5 |
| 11.x, 12.x | CVE-2026-4147 | MONGODB | 4.3 |
| 11.x, 12.x | CVE-2026-4148 | MONGODB | 8.8 |
| 11.x, 12.x | CVE-2026-5170 | MONGODB | 5.3 |
| 11.x, 12.x | CVE-2026-1337 | NEO4J | 5.4 |
| 11.x, 12.x | CVE-2026-27314 | APACHE CASSANDRA | 8.8 |
| 11.x, 12.x | CVE-2026-27315 | APACHE CASSANDRA | 5.5 |
| 11.x, 12.x | CVE-2026-32588 | APACHE CASSANDRA | 6.5 |
| 11.x, 12.x | SIA-MVS-2026.02-36 | IBM DB2 Z/OS | N/A |
| 11.x, 12.x | DT458573 | IBM iSeries | N/A |
| 11.x, 12.x | DT458999 | IBM iSeries | N/A |
| 11.x, 12.x | DT459939 | IBM iSeries | N/A |
| 11.x, 12.x | DT459942 | IBM iSeries | N/A |
| 11.x, 12.x | DT460197 | IBM iSeries | N/A |
| 11.x, 12.x | DT460932 | IBM iSeries | N/A |
| 11.x, 12.x | DT461434 | IBM iSeries | N/A |
| 11.x, 12.x | DT461869 | IBM iSeries | N/A |
| 11.x, 12.x | DT461870 | IBM iSeries | N/A |
| 11.x, 12.x | DT462002 | IBM iSeries | N/A |
| 11.x, 12.x | DT462006 | IBM iSeries | N/A |
| 11.x, 12.x | DT462232 | IBM iSeries | N/A |
| 11.x, 12.x | DT462233 | IBM iSeries | N/A |
| 11.x, 12.x | DT462234 | IBM iSeries | N/A |
| 11.x, 12.x | DT462241 | IBM iSeries | N/A |
| 11.x, 12.x | DT462359 | IBM iSeries | N/A |
| 11.x, 12.x | DT462847 | IBM iSeries | N/A |
| 11.x, 12.x | DT463185 | IBM iSeries | N/A |
| 11.x, 12.x | DT464620 | IBM iSeries | N/A |
| 11.x, 12.x | DT465115 | IBM iSeries | N/A |
| 11.x, 12.x | DT465231 | IBM iSeries | N/A |
| 11.x, 12.x | DT467719 | IBM iSeries | N/A |
| 11.x, 12.x | DT467722 | IBM iSeries | N/A |
| 11.x, 12.x | DT467993 | IBM iSeries | N/A |
Was this topic helpful?
Document Information
Modified date:
15 May 2026
UID
ibm17272769