Total vulnerabilities in the database
IBM DB2 7.1 and 8.1 allow the bin user to gain root privileges by modifying the shared libraries that are used in setuid root programs.
Software | From | Fixed in |
---|---|---|
ibm / db2_universal_database | 8.1 | 8.1.x |
ibm / db2 | 9.0 | 9.0.x |
ibm / db2_universal_database | 8.0 | 8.0.x |
ibm / db2_universal_database | 7.1 | 7.1.x |
ibm / db2_universal_database | 6.0 | 6.0.x |
ibm / db2_universal_database | 7.0 | 7.0.x |
ibm / db2_universal_database | 7.2 | 7.2.x |
ibm / db2_universal_database | 8.2 | 8.2.x |