IBM Support

Guardium response to Spectre and Meltdown vulnerabilities

Flash (Alert)


Abstract

Guardium response to Spectre and Meltdown vulnerabilities

Content


On Wednesday, January 3, 2018 researchers announced a security vulnerability affecting microprocessors, as explained in more detail in this PSIRT post

1- Patches for the Guardium appliance
Exploitation of the Meltdown and Spectre vulnerabilities requires injection of code into a server, which in turn requires root access. By default, Guardium appliances do not allow customers privileged access. Only IBM Support, under supervision by the customer, has privileged access. Guardium appliance systems updates to address these vulnerabilities are dependent on OS vendor(s) updates being released and will be provided on FixCentral when available.


2- Patches for Guardium Agents
For servers monitored by Guardium Agents, such as STAP, KTAP, or ATAP, customers should contact their hardware and OS vendors for information to mitigate the Meltdown and Spectre vulnerabilities. Customers using flex-loading or local-build features of KTAP should be able to use the agents without changes. Customers that cannot use flex-loading or local-build features should prepare for release of updated agents with updated kernel support from Guardium.

FAQs
Q. How can I setup KTAP for flex loading and/or local-build?
A. Follow instructions here:

Document information

More support for: IBM Security Guardium

Software version: 9.0, 9.1, 9.5, 10.0, 10.0.1, 10.1, 10.1.2, 10.1.3, 10.1.4

Operating system(s): AIX, HP-UX, Linux, Solaris

Reference #: 2013484

Modified date: 08 February 2018