{"id":6379,"date":"2018-01-05T14:10:43","date_gmt":"2018-01-05T13:10:43","guid":{"rendered":"http:\/\/blog.capdata.fr\/?p=6379"},"modified":"2019-09-13T11:00:17","modified_gmt":"2019-09-13T10:00:17","slug":"le-point-sur-meltdown-et-les-bases-de-donnees","status":"publish","type":"post","link":"https:\/\/blog.capdata.fr\/index.php\/le-point-sur-meltdown-et-les-bases-de-donnees\/","title":{"rendered":"Le point sur Meltdown et les bases de donn\u00e9es"},"content":{"rendered":"<a class=\"synved-social-button synved-social-button-share synved-social-size-24 synved-social-resolution-single synved-social-provider-twitter nolightbox\" data-provider=\"twitter\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fblog.capdata.fr%2Findex.php%2Fwp-json%2Fwp%2Fv2%2Fposts%2F6379&#038;text=Article%20sur%20le%20blog%20de%20la%20Capdata%20Tech%20Team%20%3A%20\" style=\"font-size: 0px;width:24px;height:24px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"twitter\" title=\"Share on Twitter\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"24\" height=\"24\" style=\"display: inline;width:24px;height:24px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/blog.capdata.fr\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/48x48\/twitter.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-24 synved-social-resolution-single synved-social-provider-linkedin nolightbox\" data-provider=\"linkedin\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Linkedin\" href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https%3A%2F%2Fblog.capdata.fr%2Findex.php%2Fwp-json%2Fwp%2Fv2%2Fposts%2F6379&#038;title=Le%20point%20sur%20Meltdown%20et%20les%20bases%20de%20donn%C3%A9es\" style=\"font-size: 0px;width:24px;height:24px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"linkedin\" title=\"Share on Linkedin\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"24\" height=\"24\" style=\"display: inline;width:24px;height:24px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/blog.capdata.fr\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/48x48\/linkedin.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-24 synved-social-resolution-single synved-social-provider-mail nolightbox\" data-provider=\"mail\" rel=\"nofollow\" title=\"Share by email\" href=\"mailto:?subject=Le%20point%20sur%20Meltdown%20et%20les%20bases%20de%20donn%C3%A9es&#038;body=Article%20sur%20le%20blog%20de%20la%20Capdata%20Tech%20Team%20%3A%20:%20https%3A%2F%2Fblog.capdata.fr%2Findex.php%2Fwp-json%2Fwp%2Fv2%2Fposts%2F6379\" style=\"font-size: 0px;width:24px;height:24px;margin:0;margin-bottom:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"mail\" title=\"Share by email\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"24\" height=\"24\" style=\"display: inline;width:24px;height:24px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/blog.capdata.fr\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/48x48\/mail.png\" \/><\/a><p>Tout d&#8217;abord bonne ann\u00e9e \u00e0 tous et meilleurs v\u0153ux pour 2018 !<\/p>\n<p>Cette ann\u00e9e d\u00e9marre sur les chapeaux de roues pour tous les ouvriers de l&#8217;IT que nous sommes avec l&#8217;annonce officielle faite le 3 janvier dernier de deux failles principales d\u00e9couvertes au c\u0153ur de l&#8217;architecture des processeurs, les d\u00e9nomm\u00e9es\u00a0\u00a0<a href=\"https:\/\/meltdownattack.com\/\">Meltdown et Spectre<\/a>.\u00a0Les deux failles bien que d\u00e9voilant des vuln\u00e9rabilit\u00e9s distinctes reposent toutes les deux sur le principe d&#8217;ex\u00e9cution sp\u00e9culative impl\u00e9ment\u00e9e dans les processeurs Intel depuis des lustres (l&#8217;\u00e9quipe de Google Project Zero mentionne des CPU datant de 1995&#8230;).<\/p>\n<p>Le principe est que derri\u00e8re un branchement conditionnel (<em>if &#8230;<\/em>) , le processeur va commencer \u00e0 ex\u00e9cuter certaines instructions par anticipation en utilisant un algorithme pr\u00e9dictif. Si la condition est invalide (<em>branch mispredict<\/em>), alors les registres affect\u00e9s par ces ex\u00e9cutions anticip\u00e9es seront invalid\u00e9s et le flot d&#8217;ex\u00e9cution est raccroch\u00e9 \u00e0 la condition valide. Toutefois des traces sont laiss\u00e9es au niveau des caches ce qui permet d&#8217;aller lire depuis l&#8217;espace d&#8217;adressage utilisateur (<em>usermode<\/em>) des donn\u00e9es prot\u00e9g\u00e9es dans l&#8217;espace r\u00e9serv\u00e9 au noyau (<em>kernelmode<\/em>). Dans le cas de Meltdown, cela permet d&#8217;aller d\u00e9coder l&#8217;<a href=\"https:\/\/pax.grsecurity.net\/docs\/aslr.txt\">ASLR<\/a>, la randomisation du chargement des adresses m\u00e9moire du noyau, et de savoir \u00e0 quelle adresse quel module est charg\u00e9, pour pouvoir de nouveau\u00a0 g\u00e9n\u00e9rer des attaques comme c&#8217;\u00e9tait le cas avant la mise en place de ces m\u00e9canismes (2007 sur Windows, 2001 sur Linux).<\/p>\n<p>Cons\u00e9quence, des donn\u00e9es sensibles que l&#8217;on croyait prot\u00e9g\u00e9es et inviolables nativement de par l&#8217;architecture du processeur peuvent \u00eatre d\u00e9rob\u00e9es.<\/p>\n<p>Pour plus de d\u00e9tails, se reporter au document d&#8217;\u00e9tude concernant chaque faille (<a href=\"https:\/\/meltdownattack.com\/meltdown.pdf\">Meltdown<\/a>, <a href=\"https:\/\/spectreattack.com\/spectre.pdf\">Spectre<\/a>), ainsi qu&#8217;au travail pr\u00e9liminaire fourni par <a href=\"https:\/\/cyber.wtf\/2017\/07\/28\/negative-result-reading-kernel-memory-from-user-mode\/\">Anders Fogh<\/a>\u00a0en juillet 2017 et qui avait conduit les diff\u00e9rents acteurs (Project Zero, Universit\u00e9 de Graz et Cyberus) \u00e0 remonter le probl\u00e8me aux principaux int\u00e9ress\u00e9s Intel, AMD, etc&#8230;<\/p>\n<p>Des patches pour Meltdown seulement ont commenc\u00e9 \u00e0 \u00eatre d\u00e9ploy\u00e9s d&#8217;abord sur Linux, puis Windows, et on a commenc\u00e9 \u00e0 voir passer des interruptions de service pour passage de ces patches notamment sur les plateformes cloud AMAZON et Microsoft pour la partie IaaS pas plus tard qu&#8217;hier dans la journ\u00e9e.<\/p>\n<p>La seule info technique sur la solution de contournement vient de l&#8217;adoption du patch dit <a href=\"https:\/\/lwn.net\/Articles\/738975\/\">KAISER<\/a> propos\u00e9 par le groupe de travail sur Meltdown, dans la distro Linux mainstream le <a href=\"https:\/\/lwn.net\/Articles\/742404\/\">29 d\u00e9cembre dernier<\/a>. La solution est d&#8217;impl\u00e9menter le <a href=\"https:\/\/lwn.net\/Articles\/741878\/\">Kernel Page Table Isolation<\/a> ou KPTI afin de retirer la visibilit\u00e9 de l&#8217;espace d&#8217;adressage noyau depuis le user mode. Cette solution s&#8217;applique \u00e0 Meltdown uniquement.<\/p>\n<p>Maintenant la question c&#8217;est quelles sont les cons\u00e9quences d&#8217;un tel bouleversement pour les bases de donn\u00e9es car il y a d\u00e9j\u00e0 quelques retours sur l&#8217;impact en termes de performance notamment\u00a0<a href=\"https:\/\/www.phoronix.com\/scan.php?page=article&amp;item=linux-415-x86pti&amp;num=2\">ici<\/a>\u00a0et <a href=\"https:\/\/www.postgresql.org\/message-id\/20180102222354.qikjmf7dvnjgbkxe@alap3.anarazel.de\">l\u00e0<\/a>.<\/p>\n<h1>SQL Server<\/h1>\n<p>Microsoft a donc fourni une <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4073225\/guidance-for-sql-server\">note<\/a>\u00a0sp\u00e9cifique pour SQL Server en pr\u00e9cisant le type de sc\u00e9nario (bare metal, machine virtuelle, cloud, linux) le degr\u00e9 d&#8217;exposition et les pr\u00e9conisations. Les versions \u00e9tant concern\u00e9es par les patches sont les versions \u00e0 partir de SQL Server 2008 jusqu&#8217;\u00e0 la SQL Server 2017, versions Itanium non comprises. Les plus anciennes ne seront pas corrig\u00e9es, ce qui devrait inciter les retardataires \u00e0 migrer si ce n&#8217;est pas d\u00e9j\u00e0 fait. La bonne nouvelle c&#8217;est qu&#8217;une grosse partie des fonctionnalit\u00e9s Enterprise de SQL Server 2016 <a href=\"https:\/\/blogs.technet.microsoft.com\/dataplatforminsider\/2016\/11\/16\/sql-server-2016-service-pack-1-generally-available\/\">est \u00e9galement disponible en \u00e9dition standard<\/a>, ce serait dommage de ne pas profiter de l&#8217;occasion.<\/p>\n<p>4 patches de s\u00e9curit\u00e9 sur SQL Server sont disponibles pour l&#8217;instant pour les versions 2016 et 2017, en GDR et dans le dernier CU \u00e0 chaque fois, on ne sait pas ce qu&#8217;ils contiennent ni ce qu&#8217;ils font.<\/p>\n<p>Egalement une liste des fonctionnalit\u00e9s &#8216;\u00e0 risque&#8217; est mentionn\u00e9e principalement tout ce qui concerne de l&#8217;ex\u00e9cution de code externe comme CLR, proc\u00e9dures stock\u00e9es \u00e9tendues, R\/Python, et l&#8217;utilisation de serveurs li\u00e9s hors du p\u00e9rim\u00e8tre de confiance.\u00a0 Mais globalement si SQL Server est ex\u00e9cut\u00e9 en bare metal dans un environnement &#8216;de confiance&#8217; c&#8217;est \u00e0 dire que tous les composants p\u00e9riph\u00e9riques sont connus et valid\u00e9s du point de vue s\u00e9curit\u00e9, il n&#8217;y a pas de raison de patcher dans l&#8217;imm\u00e9diat.<\/p>\n<p>A savoir qu&#8217;une <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4072698\/windows-server-guidance-to-protect-against-the-speculative-execution\">note<\/a>\u00a0similaire pour Windows Server est \u00e9galement disponible. On n&#8217;a pas pour l&#8217;instant de retour sur l&#8217;impact de SQL Server 2017 sur Linux avec KTPI activ\u00e9.<\/p>\n<p><em><strong>Update ! 11 janvier 2018<\/strong><\/em><\/p>\n<div>Une <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/01\/09\/understanding-the-performance-impact-of-spectre-and-meltdown-mitigations-on-windows-systems\/\">publication officielle<\/a> fait le point sur les vuln\u00e9rabilit\u00e9s, les patches et les potentielles r\u00e9gressions attendues en fonction des OS. Windows 7 et 8 seraient davantage impact\u00e9s que Windows 10.<\/div>\n<h1>Oracle<\/h1>\n<p>Pour l&#8217;instant pas de nouvelle de l&#8217;impl\u00e9mentation de <a href=\"https:\/\/lwn.net\/Articles\/741878\/\">KPTI<\/a> sur OEL 6 et 7, alors que chez Red Hat on\u00a0<a href=\"https:\/\/access.redhat.com\/security\/vulnerabilities\/speculativeexecution\">a d\u00e9j\u00e0 commenc\u00e9 \u00e0 travailler<\/a> sur le sujet. Pas vu pour l&#8217;instant de communiqu\u00e9 d&#8217;Oracle sur Meltdown, qui est le risque le plus imm\u00e9diat. Pas de benchmark donc disponible, mais il est \u00e0 pr\u00e9voir qu&#8217;il y aura un impact sur la partie OS, RDBMS et m\u00eame cloud puisque Oracle VM s&#8217;appuie sur Xen qui est dans le scope.<\/p>\n<p><em><strong>Update ! 11 janvier 2018<\/strong><\/em><\/p>\n<p>Thierry dans les commentaires nous indique qu&#8217;Oracle a publi\u00e9 des correctifs pour OEL 6 et 7:<\/p>\n<p><a href=\"https:\/\/linux.oracle.com\/errata\/ELSA-2018-0007.html\" rel=\"nofollow\">https:\/\/linux.oracle.com\/errata\/ELSA-2018-0007.html<\/a><br \/>\n<a href=\"https:\/\/linux.oracle.com\/errata\/ELSA-2018-0008.html\" rel=\"nofollow\">https:\/\/linux.oracle.com\/errata\/ELSA-2018-0008.html<\/a><\/p>\n<h1>MySQL:<\/h1>\n<p><a href=\"https:\/\/www.percona.com\/blog\/2018\/01\/04\/meltdown-spectre-cpu-security-vulnerabilities\/\">Percona<\/a> a commenc\u00e9 \u00e0 communiquer\u00a0 sur le sujet pour l&#8217;instant m\u00eame chose pas de benchmark disponible:<\/p>\n<p><em>&#8220;At this time, Percona does not have conclusive results on how much performance impact you might expect on your databases. We\u2019re working on getting some benchmarks results published shortly.&#8221;<\/em><\/p>\n<p>Pas de comm chez MariaDB sur le sujet pour l&#8217;instant On rappelle que les principaux int\u00e9ress\u00e9s sont d&#8217;une part Intel et dans une moindre mesure AMD, puis les \u00e9diteurs d&#8217;operating system. Les \u00e9diteurs de base de donn\u00e9es sont eux en bout de cha\u00eene et hormis Microsoft qui a d\u00e9j\u00e0 publi\u00e9 des correctifs pour SQL Server (dont on ignore le contenu), les autres s&#8217;en tiennent aux correctifs Linux et Windows.<\/p>\n<p><em><strong>Update ! 11 janvier 2018<\/strong><\/em><\/p>\n<div>Premier <a href=\"https:\/\/dbahire.com\/finding-out-the-mysql-performance-regression-due-to-kernel-mitigation-for-meltdown-cpu-vulnerability\/\">bench<\/a> remont\u00e9 et qui montre 7% de charge en plus sur l&#8217;OS patch\u00e9 (Debian en l&#8217;occurence) avec pcid et jusqu&#8217;\u00e0 11% en nopcid.<\/div>\n<h1>PostgreSQL<\/h1>\n<p>La <a href=\"https:\/\/www.postgresql.org\/message-id\/20180102222354.qikjmf7dvnjgbkxe@alap3.anarazel.de\">premi\u00e8re alerte<\/a> est venue d&#8217;Andres Freund sur la mailing list <a href=\"https:\/\/www.postgresql.org\/list\/pgsql-hackers\/since\/201801022223\">hackers<\/a> en d\u00e9but de semaine qui a pu tester rapidement une \u00e9ventuelle d\u00e9gradation de perfs en TPS avec et sans l&#8217;activitation des KTPIs qui montre un -16% sur une simple requ\u00eate CPU bound en local. Je vous invite vivement \u00e0 lire le contenu de ce post et vous abonner \u00e0 la suite. <a href=\"http:\/\/rhaas.blogspot.fr\/\">Robert Haas<\/a> a d\u00e9j\u00e0 commenc\u00e9 \u00e0 r\u00e9pondre et il y a fort \u00e0 parier que le fil de discussion s&#8217;enrichisse au fil des jours.<\/p>\n<p><em><strong>Update ! 11 janvier 2018<\/strong><\/em><\/p>\n<div>Simon Riggs a publi\u00e9 un article <a href=\"https:\/\/blog.2ndquadrant.com\/postgresql-meltdown\/\">hier<\/a> pour remettre les choses au clair concernant les all\u00e9gations de probl\u00e8me de performance sur PostgreSQL. Les tests effectu\u00e9s montrent une perte de 7% sur l&#8217;activit\u00e9 CPU bound avec <em>pti=on<\/em>. La seule vuln\u00e9rabilit\u00e9 connue \u00e0 travers PostgreSQL concerne l&#8217;utilisation de langages PL non trust\u00e9s comme PL\/PerlU. Aucun patch de s\u00e9curit\u00e9 n&#8217;est pr\u00e9vu c\u00f4t\u00e9 PostgreSQL, la recommandation est bien \u00e9videmment d&#8217;appliquer les patches OS disponibles.<\/div>\n<h1>Conclusion:<\/h1>\n<p>Pour l&#8217;instant beaucoup de <em>sp\u00e9culations<\/em>\u00a0 sur les impacts en termes de performance de ces nouveaux patches sur les bases de donn\u00e9es, et pas beaucoup de faits, mais soyons s\u00fbr que \u00e7a va arriver dans le mois de janvier. Sur Linux, la solution de s\u00e9parer les pages tables entre usermode et kernelmode va certainement rajouter des cycles \u00e0 chaque interruption, appel syst\u00e8me, etc&#8230; Sur Windows on ne sait pas encore quelles modifications ont \u00e9t\u00e9 faites pour prot\u00e9ger la randomisation des adresses m\u00e9moire du noyau (ASLR), on peut supposer que ce sera du m\u00eame acabit que sur Linux, \u00e0 savoir masquer les entr\u00e9es depuis le usermode.<\/p>\n<p>Ce qui est certain c&#8217;est que l&#8217;on va voir d\u00e9bouler tout un tas d&#8217;op\u00e9rations de patch de securit\u00e9 chez tous les <a href=\"https:\/\/www.ovh.com\/fr\/blog\/vulnerabilites-meltdown-spectre-cpu-x86-64-ovh-pleinement-mobilise\/\">h\u00e9bergeurs<\/a>\u00a0, certaines ayant commenc\u00e9 d\u00e9j\u00e0 sur AWS et potentiellement Azure.<\/p>\n<p>Stay tuned<\/p>\n<p>~David<\/p>\n<a class=\"synved-social-button synved-social-button-share synved-social-size-24 synved-social-resolution-single synved-social-provider-twitter nolightbox\" data-provider=\"twitter\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fblog.capdata.fr%2Findex.php%2Fwp-json%2Fwp%2Fv2%2Fposts%2F6379&#038;text=Article%20sur%20le%20blog%20de%20la%20Capdata%20Tech%20Team%20%3A%20\" style=\"font-size: 0px;width:24px;height:24px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"twitter\" title=\"Share on Twitter\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"24\" height=\"24\" style=\"display: inline;width:24px;height:24px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/blog.capdata.fr\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/48x48\/twitter.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-24 synved-social-resolution-single synved-social-provider-linkedin nolightbox\" data-provider=\"linkedin\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Linkedin\" href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https%3A%2F%2Fblog.capdata.fr%2Findex.php%2Fwp-json%2Fwp%2Fv2%2Fposts%2F6379&#038;title=Le%20point%20sur%20Meltdown%20et%20les%20bases%20de%20donn%C3%A9es\" style=\"font-size: 0px;width:24px;height:24px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"linkedin\" title=\"Share on Linkedin\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"24\" height=\"24\" style=\"display: inline;width:24px;height:24px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/blog.capdata.fr\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/48x48\/linkedin.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-24 synved-social-resolution-single synved-social-provider-mail nolightbox\" data-provider=\"mail\" rel=\"nofollow\" title=\"Share by email\" href=\"mailto:?subject=Le%20point%20sur%20Meltdown%20et%20les%20bases%20de%20donn%C3%A9es&#038;body=Article%20sur%20le%20blog%20de%20la%20Capdata%20Tech%20Team%20%3A%20:%20https%3A%2F%2Fblog.capdata.fr%2Findex.php%2Fwp-json%2Fwp%2Fv2%2Fposts%2F6379\" style=\"font-size: 0px;width:24px;height:24px;margin:0;margin-bottom:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"mail\" title=\"Share by email\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"24\" height=\"24\" style=\"display: inline;width:24px;height:24px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/blog.capdata.fr\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/48x48\/mail.png\" \/><\/a>","protected":false},"excerpt":{"rendered":"<p>Tout d&#8217;abord bonne ann\u00e9e \u00e0 tous et meilleurs v\u0153ux pour 2018 ! Cette ann\u00e9e d\u00e9marre sur les chapeaux de roues pour tous les ouvriers de l&#8217;IT que nous sommes avec l&#8217;annonce officielle faite le 3 janvier dernier de deux failles&hellip; <a href=\"https:\/\/blog.capdata.fr\/index.php\/le-point-sur-meltdown-et-les-bases-de-donnees\/\" class=\"more-link\">Continuer la lecture <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":7807,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[143,173],"tags":[275,278,277,276],"class_list":["post-6379","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","category-operating-system","tag-meltdown","tag-securite","tag-side-channel-attacks","tag-spectre"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Le point sur Meltdown et les bases de donn\u00e9es - Capdata TECH BLOG<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.capdata.fr\/index.php\/le-point-sur-meltdown-et-les-bases-de-donnees\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Le point sur Meltdown et les bases de donn\u00e9es - Capdata TECH BLOG\" \/>\n<meta property=\"og:description\" content=\"Tout d&#8217;abord bonne ann\u00e9e \u00e0 tous et meilleurs v\u0153ux pour 2018 ! Cette ann\u00e9e d\u00e9marre sur les chapeaux de roues pour tous les ouvriers de l&#8217;IT que nous sommes avec l&#8217;annonce officielle faite le 3 janvier dernier de deux failles&hellip; Continuer la lecture &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.capdata.fr\/index.php\/le-point-sur-meltdown-et-les-bases-de-donnees\/\" \/>\n<meta property=\"og:site_name\" content=\"Capdata TECH BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-05T13:10:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-09-13T10:00:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2018\/01\/chocolate-1934_960_720.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"640\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"David Baffaleuf\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Baffaleuf\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.capdata.fr\/index.php\/le-point-sur-meltdown-et-les-bases-de-donnees\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.capdata.fr\/index.php\/le-point-sur-meltdown-et-les-bases-de-donnees\/\"},\"author\":{\"name\":\"David Baffaleuf\",\"@id\":\"https:\/\/blog.capdata.fr\/#\/schema\/person\/136297da9f61d6e4878abe0f48bc5fbf\"},\"headline\":\"Le point sur Meltdown et les bases de donn\u00e9es\",\"datePublished\":\"2018-01-05T13:10:43+00:00\",\"dateModified\":\"2019-09-13T10:00:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.capdata.fr\/index.php\/le-point-sur-meltdown-et-les-bases-de-donnees\/\"},\"wordCount\":1359,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/blog.capdata.fr\/#organization\"},\"keywords\":[\"meltdown\",\"s\u00e9curit\u00e9\",\"side-channel attacks\",\"spectre\"],\"articleSection\":[\"G\u00e9n\u00e9ral\",\"Operating System\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.capdata.fr\/index.php\/le-point-sur-meltdown-et-les-bases-de-donnees\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.capdata.fr\/index.php\/le-point-sur-meltdown-et-les-bases-de-donnees\/\",\"url\":\"https:\/\/blog.capdata.fr\/index.php\/le-point-sur-meltdown-et-les-bases-de-donnees\/\",\"name\":\"Le point sur Meltdown et les bases de donn\u00e9es - Capdata TECH BLOG\",\"isPartOf\":{\"@id\":\"https:\/\/blog.capdata.fr\/#website\"},\"datePublished\":\"2018-01-05T13:10:43+00:00\",\"dateModified\":\"2019-09-13T10:00:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.capdata.fr\/index.php\/le-point-sur-meltdown-et-les-bases-de-donnees\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.capdata.fr\/index.php\/le-point-sur-meltdown-et-les-bases-de-donnees\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.capdata.fr\/index.php\/le-point-sur-meltdown-et-les-bases-de-donnees\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/blog.capdata.fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Le point sur Meltdown et les bases de donn\u00e9es\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.capdata.fr\/#website\",\"url\":\"https:\/\/blog.capdata.fr\/\",\"name\":\"Capdata TECH BLOG\",\"description\":\"Le blog technique sur les bases de donn\u00e9es de CAP DATA Consulting\",\"publisher\":{\"@id\":\"https:\/\/blog.capdata.fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.capdata.fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.capdata.fr\/#organization\",\"name\":\"Capdata TECH BLOG\",\"url\":\"https:\/\/blog.capdata.fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/blog.capdata.fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2023\/01\/logo_capdata.webp\",\"contentUrl\":\"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2023\/01\/logo_capdata.webp\",\"width\":800,\"height\":254,\"caption\":\"Capdata TECH BLOG\"},\"image\":{\"@id\":\"https:\/\/blog.capdata.fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/cap-data-consulting\/mycompany\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.capdata.fr\/#\/schema\/person\/136297da9f61d6e4878abe0f48bc5fbf\",\"name\":\"David Baffaleuf\",\"sameAs\":[\"http:\/\/www.capdata.fr\"],\"url\":\"https:\/\/blog.capdata.fr\/index.php\/author\/dbaffaleuf\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Le point sur Meltdown et les bases de donn\u00e9es - Capdata TECH BLOG","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.capdata.fr\/index.php\/le-point-sur-meltdown-et-les-bases-de-donnees\/","og_locale":"fr_FR","og_type":"article","og_title":"Le point sur Meltdown et les bases de donn\u00e9es - Capdata TECH BLOG","og_description":"Tout d&#8217;abord bonne ann\u00e9e \u00e0 tous et meilleurs v\u0153ux pour 2018 ! Cette ann\u00e9e d\u00e9marre sur les chapeaux de roues pour tous les ouvriers de l&#8217;IT que nous sommes avec l&#8217;annonce officielle faite le 3 janvier dernier de deux failles&hellip; Continuer la lecture &rarr;","og_url":"https:\/\/blog.capdata.fr\/index.php\/le-point-sur-meltdown-et-les-bases-de-donnees\/","og_site_name":"Capdata TECH BLOG","article_published_time":"2018-01-05T13:10:43+00:00","article_modified_time":"2019-09-13T10:00:17+00:00","og_image":[{"width":960,"height":640,"url":"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2018\/01\/chocolate-1934_960_720.jpg","type":"image\/jpeg"}],"author":"David Baffaleuf","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"David Baffaleuf","Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.capdata.fr\/index.php\/le-point-sur-meltdown-et-les-bases-de-donnees\/#article","isPartOf":{"@id":"https:\/\/blog.capdata.fr\/index.php\/le-point-sur-meltdown-et-les-bases-de-donnees\/"},"author":{"name":"David Baffaleuf","@id":"https:\/\/blog.capdata.fr\/#\/schema\/person\/136297da9f61d6e4878abe0f48bc5fbf"},"headline":"Le point sur Meltdown et les bases de donn\u00e9es","datePublished":"2018-01-05T13:10:43+00:00","dateModified":"2019-09-13T10:00:17+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.capdata.fr\/index.php\/le-point-sur-meltdown-et-les-bases-de-donnees\/"},"wordCount":1359,"commentCount":1,"publisher":{"@id":"https:\/\/blog.capdata.fr\/#organization"},"keywords":["meltdown","s\u00e9curit\u00e9","side-channel attacks","spectre"],"articleSection":["G\u00e9n\u00e9ral","Operating System"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.capdata.fr\/index.php\/le-point-sur-meltdown-et-les-bases-de-donnees\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.capdata.fr\/index.php\/le-point-sur-meltdown-et-les-bases-de-donnees\/","url":"https:\/\/blog.capdata.fr\/index.php\/le-point-sur-meltdown-et-les-bases-de-donnees\/","name":"Le point sur Meltdown et les bases de donn\u00e9es - Capdata TECH BLOG","isPartOf":{"@id":"https:\/\/blog.capdata.fr\/#website"},"datePublished":"2018-01-05T13:10:43+00:00","dateModified":"2019-09-13T10:00:17+00:00","breadcrumb":{"@id":"https:\/\/blog.capdata.fr\/index.php\/le-point-sur-meltdown-et-les-bases-de-donnees\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.capdata.fr\/index.php\/le-point-sur-meltdown-et-les-bases-de-donnees\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.capdata.fr\/index.php\/le-point-sur-meltdown-et-les-bases-de-donnees\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/blog.capdata.fr\/"},{"@type":"ListItem","position":2,"name":"Le point sur Meltdown et les bases de donn\u00e9es"}]},{"@type":"WebSite","@id":"https:\/\/blog.capdata.fr\/#website","url":"https:\/\/blog.capdata.fr\/","name":"Capdata TECH BLOG","description":"Le blog technique sur les bases de donn\u00e9es de CAP DATA Consulting","publisher":{"@id":"https:\/\/blog.capdata.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.capdata.fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/blog.capdata.fr\/#organization","name":"Capdata TECH BLOG","url":"https:\/\/blog.capdata.fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/blog.capdata.fr\/#\/schema\/logo\/image\/","url":"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2023\/01\/logo_capdata.webp","contentUrl":"https:\/\/blog.capdata.fr\/wp-content\/uploads\/2023\/01\/logo_capdata.webp","width":800,"height":254,"caption":"Capdata TECH BLOG"},"image":{"@id":"https:\/\/blog.capdata.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cap-data-consulting\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/blog.capdata.fr\/#\/schema\/person\/136297da9f61d6e4878abe0f48bc5fbf","name":"David Baffaleuf","sameAs":["http:\/\/www.capdata.fr"],"url":"https:\/\/blog.capdata.fr\/index.php\/author\/dbaffaleuf\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.capdata.fr\/index.php\/wp-json\/wp\/v2\/posts\/6379","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.capdata.fr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.capdata.fr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.capdata.fr\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.capdata.fr\/index.php\/wp-json\/wp\/v2\/comments?post=6379"}],"version-history":[{"count":57,"href":"https:\/\/blog.capdata.fr\/index.php\/wp-json\/wp\/v2\/posts\/6379\/revisions"}],"predecessor-version":[{"id":6428,"href":"https:\/\/blog.capdata.fr\/index.php\/wp-json\/wp\/v2\/posts\/6379\/revisions\/6428"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.capdata.fr\/index.php\/wp-json\/wp\/v2\/media\/7807"}],"wp:attachment":[{"href":"https:\/\/blog.capdata.fr\/index.php\/wp-json\/wp\/v2\/media?parent=6379"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.capdata.fr\/index.php\/wp-json\/wp\/v2\/categories?post=6379"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.capdata.fr\/index.php\/wp-json\/wp\/v2\/tags?post=6379"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}