09.01.2018 12:36, Mark Rotteveel wrote:
it can be exploited by any code running local on your machine. So anything on that machine that could have a remote code execution vulnerability, or just a plain malicious update, could then exploit it.
Anything that can have such vulnerability don't need tricky meltdown techniques to exploit database on local drive.
-- WBR, SD. ------------------------------------------------------------------------------ Check out the vibrant tech community on one of the world's most engaging tech sites, Slashdot.org! http://sdm.link/slashdot Firebird-Devel mailing list, web interface at https://lists.sourceforge.net/lists/listinfo/firebird-devel