The routine infrastructure component in IBM DB2 8 before FP17, 9.1 before FP5, and 9.5 before FP1 on Unix and Linux does not change the ownership of the db2fmp process, which has unknown impact and attack vectors.
Get an AI-powered plain-language explanation of this vulnerability and remediation steps.
Login to generate AI explanation22 reference(s) from NVD