The routine infrastructure component in IBM DB2 8 before FP17, 9.1 before FP5, and 9.5 before FP1 on Unix and Linux does not change the ownership of the db2fmp process, which has unknown impact and attack vectors.Referencesftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXThttp://www.securityfocus.com/bid/31058http://www-1.ibm.com/support/docview.wss?uid=swg21255607http://www-1.ibm.com/support/docview.wss?uid=swg1IZ20352https://exchange.xforce.ibmcloud.com/vulnerabilities/45140http://www-01.ibm.com/support/docview.wss?uid=swg1IZ19155ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v95/APARLIST.TXThttp://www.securityfocus.com/bid/29601http://www-1.ibm.com/support/docview.wss?uid=swg1IZ20350http://secunia.com/advisories/31787http://secunia.com/advisories/29784