{"id":1306,"date":"2018-01-04T07:18:31","date_gmt":"2018-01-04T15:18:31","guid":{"rendered":"http:\/\/3.209.169.194\/blogs\/glenn\/?p=1306"},"modified":"2020-01-11T12:51:57","modified_gmt":"2020-01-11T20:51:57","slug":"microsoft-sql-server-updates-for-meltdown-and-spectre-exploits","status":"publish","type":"post","link":"https:\/\/www.sqlskills.com\/blogs\/glenn\/microsoft-sql-server-updates-for-meltdown-and-spectre-exploits\/","title":{"rendered":"Microsoft SQL Server Updates for Meltdown and Spectre Exploits"},"content":{"rendered":"<p><span style=\"font-size: small;\">Over the last couple of days, you have probably heard quite a bit of chatter and speculation about some newly disclosed ways to attack various processors. The initial reports were that only Intel processors were affected, but some sources indicate that some AMD and ARM processors are also vulnerable.<\/span><\/p>\n<p><span style=\"font-size: small;\">Security researchers at Graz University (who were involved with the initial discovery of these issues) have put up a site, <a href=\"https:\/\/meltdownattack.com\/\">complete with cute logos<\/a>, with some useful information about these two exploits. <\/span><span style=\"font-size: small;\">The most detailed information so far about the attack methods comes from Google Project Zero, as shown here: <\/span><a href=\"https:\/\/googleprojectzero.blogspot.com\/2018\/01\/reading-privileged-memory-with-side.html\"><span style=\"font-size: small;\">Reading privileged memory with a side-channel<\/span><\/a>. <span style=\"font-size: small;\">Their testing shows some limited vulnerability for some older AMD processors.<\/span><\/p>\n<p><span style=\"font-size: small;\">AMD is pretty adamant that their processors are not vulnerable to these exploits, as shown by this statement from AMD\u2019s Tom Lendacky:<\/span><\/p>\n<blockquote>\n<p><span style=\"font-size: small;\">\u201cAMD processors are not subject to the types of attacks that the kernel<br \/>\npage table isolation feature protects against. The AMD microarchitecture<br \/>\ndoes not allow memory references, including speculative references, that<br \/>\naccess higher privileged data when running in a lesser privileged mode<br \/>\nwhen that access would result in a page fault.<br \/>\nDisable page table isolation by default on AMD processors by not setting<br \/>\nthe X86_BUG_CPU_INSECURE feature, which controls whether X86_FEATURE_PTI<br \/>\nis set.\u201d<\/span><\/p>\n<\/blockquote>\n<p><span style=\"font-size: small;\">Linus Torvalds also seems pretty confident that AMD is not affected, as witnessed by his comments in a <a href=\"https:\/\/github.com\/torvalds\/linux\/commit\/00a5ae218d57741088068799b810416ac249a9ce\">recent code check-in<\/a>:<\/span><\/p>\n<blockquote>\n<p><span style=\"font-size: small;\">\u201cExclude AMD from the PTI enforcement. Not necessarily a fix, but if AMD is so confident that they are not affected, then we should not burden users with the overhead&#8221;<\/span><\/p>\n<\/blockquote>\n<p><span style=\"font-size: small;\">Paul Alcorn has a <a href=\"http:\/\/www.tomshardware.com\/news\/meltdown-spectre-exploits-intel-amd-arm-nvidia,36219.html\">pretty good write-up about this issue here<\/a>. Yesterday, Phoronix published some early benchmark results against a patched version of Linux that were pretty alarming for some use cases (synthetic IO benchmarks and PostgreSQL database performance).<\/span><\/p>\n<p><span style=\"font-size: small;\">Redhat has published some information about the performance impact of OS fixes on several different workload types. The most notable is what they define as<\/span><\/p>\n<blockquote>\n<p><font size=\"2\">\u201cMeasureable: 8-19% &#8211; Highly cached random memory, with buffered I\/O, OLTP database workloads, and benchmarks with high kernel-to-user space transitions are impacted between 8-19%. Examples include OLTP Workloads (tpc), sysbench, pgbench, netperf (&lt; 256 byte), and fio (random I\/O to NvME)\u201d<\/font><\/p>\n<\/blockquote>\n<p><font size=\"2\">More details about these findings and some mitigation methods for RHEL are available in these links:<\/font><\/p>\n<blockquote>\n<p><font size=\"2\"><a href=\"https:\/\/access.redhat.com\/articles\/3307751\">Speculative Execution Exploit Performance Impacts &#8211; Describing the performance impacts to security patches for CVE-2017-5754 CVE-2017-5753 and CVE-2017-5715<\/a><\/font><\/p>\n<p><a href=\"https:\/\/access.redhat.com\/articles\/3311301\"><font size=\"2\">Controlling the Performance Impact of Microcode and Security Patches for CVE-2017-5754 CVE-2017-5715 and CVE-2017-5753 using Red Hat Enterprise Linux Tunables <\/font><\/a><\/p>\n<\/blockquote>\n<p><span style=\"font-size: small;\">It seems like the various fixes for these issues are going to hit database and virtualization performance harder than most other use cases.&nbsp; I wonder whether it will be possible for Intel to at least partially fix the issue with a stepping change on any Intel processors that are still in production (i.e. they make an actual hardware fix using the same existing processor design) that lets them send out replacement processors that work in some existing servers.<\/span><\/p>\n<p><span style=\"font-size: small;\">If you are old enough to remember the <\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/Pentium_FDIV_bug\"><span style=\"font-size: small;\">old Pentium FDIV bug in 1994<\/span><\/a><span style=\"font-size: small;\">, Intel initially tried to minimize the issue, saying that it was very rare. Then, they tried to make people prove that they were hitting the bug by running an Intel utility. Finally, they caved in to bad PR and ended up sending out replacement CPUs to a lot of people, no questions asked, which cost them $475 million back in the day. I remember swapping out my CPU, because I was a geek back then too!<\/span><\/p>\n<p><span style=\"font-size: small;\">Early this morning, Microsoft published this KB article: <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4073225\/guidance-for-sql-server\"><span style=\"font-size: small;\">SQL Server Guidance to protect against speculative execution side-channel vulnerabilities<\/span><\/a>.<span style=\"font-size: small;\"> According to Microsoft<\/span>, <span style=\"font-size: small;\">the following versions of SQL Server are impacted when running on x86 and x64 processor systems: SQL Server 2008, SQL Server 2008R2, SQL Server 2012, SQL Server 2014, SQL Server 2016, SQL Server 2017.<\/span><\/p>\n<p><span style=\"font-size: small;\">Microsoft has already issued two Cumulative Updates that include fixes to help mitigate this issue (along with the other important hotfixes included in each CU).<\/span><\/p>\n<blockquote>\n<p><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4052987\"><span style=\"font-size: small;\">Cumulative Update 3 for SQL Server 2017<\/span><\/a><\/p>\n<p><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4057119\"><span style=\"font-size: small;\">Cumulative Update 7 for SQL Server 2016 SP1<\/span><\/a><\/p>\n<\/blockquote>\n<p><span style=\"font-size: small;\">I suspect that there will be an out of band CU or hotfix for SQL Server 2014 SP2 relatively soon, since it is still in Mainstream support. Even though SQL Server 2012 and older are out of Mainstream support, Microsoft will probably develop and release hotfixes for those releases relatively soon since this is a security issue.<\/span><\/p>\n<p><span style=\"font-size: small;\">Microsoft has also started pushing out an out of band OS update for Windows 10 (<a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4056892\/windows-10-update-kb4056892\">KB4056892<\/a>) that is meant to mitigate this issue. There are similar updates for most other supported Microsoft operating systems. Here is the current information for Windows Server:<\/span><\/p>\n<blockquote>\n<p><a href=\"https:\/\/support.microsoft.com\/en-gb\/help\/4072698\/windows-server-guidance-to-protect-against-the-speculative-execution\"><font size=\"2\">Windows Server guidance to protect against speculative execution side-channel vulnerabilities<\/font><\/a><\/p>\n<\/blockquote>\n<p><span style=\"font-size: small;\">Here is Microsoft\u2019s current security advisory advice:<\/span><\/p>\n<blockquote>\n<p><span style=\"font-size: small;\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180002\">ADV180002 | Guidance to mitigate speculative execution side-channel vulnerabilities<\/a><\/span><\/p>\n<\/blockquote>\n<p><span style=\"font-size: small;\">Microsoft has also released this statement about how they have been handling this for Microsoft Azure<\/span><\/p>\n<blockquote>\n<p><span style=\"font-size: small;\"><a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/securing-azure-customers-from-cpu-vulnerability\/\">Securing Azure customers from CPU vulnerability<\/a><\/span><\/p>\n<\/blockquote>\n<p><span style=\"font-size: small;\">Here is what I plan on doing over the next couple of weeks as this starts to shake out:<\/span><\/p>\n<ul>\n<li><span style=\"font-size: small;\">Find out what Intel has to say about this issue (beyond <a href=\"https:\/\/newsroom.intel.com\/news\/intel-responds-to-security-research-findings\/\">this vague initial statement<\/a>)<\/span><\/li>\n<ul>\n<li><span style=\"font-size: small;\"><a href=\"https:\/\/security-center.intel.com\/advisories.aspx\">Intel Security Advisories<\/a><\/span><\/li>\n<li><span style=\"font-size: small;\"><a href=\"https:\/\/newsroom.intel.com\/wp-content\/uploads\/sites\/11\/2018\/01\/Intel-Analysis-of-Speculative-Execution-Side-Channels.pdf\">Intel Analysis of Speculative Execution Side Channels (PDF)<\/a><\/span><\/li>\n<\/ul>\n<li><span style=\"font-size: small;\">Find out if possible, which Intel processor families are affected by the issue<\/span><\/li>\n<ul>\n<li><font size=\"2\"><a href=\"https:\/\/security-center.intel.com\/advisory.aspx?intelid=INTEL-SA-00088&amp;languageid=en-fr\">Speculative Execution and Indirect Branch Prediction Side Channel Analysis Method<\/a><\/font><\/li>\n<\/ul>\n<li><span style=\"font-size: small;\">Find out whether newer Intel processor families are less affected than older Intel processor families <\/span><\/li>\n<ul>\n<li><font size=\"2\"><a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/01\/09\/understanding-the-performance-impact-of-spectre-and-meltdown-mitigations-on-windows-systems\/\">Understanding the performance impact of Spectre and Meltdown mitigations on Windows Systems<\/a><\/font><\/li>\n<\/ul>\n<li><span style=\"font-size: small;\">Find out if Intel can fix the issue with a hardware change for current production processors like the <a href=\"https:\/\/ark.intel.com\/products\/series\/125191\/Intel-Xeon-Scalable-Processors\">Xeon Scalable Processor Family<\/a><\/span><\/li>\n<li><span style=\"font-size: small;\">Do some before\/after testing with CPU-Z, Geekbench, CrystalDiskMark, and DiskSpd to see how performance is affected by the patches <\/span><\/li>\n<li><span style=\"font-size: small;\">Do some SQL Server testing with some common, easy tasks, such as big sequential reads, running DBCC CHECKDB, running full backups and restores to see how SQL Server is affected by the OS patch<\/span><\/li>\n<\/ul>\n<p><span style=\"font-size: small;\">Here is what I think you should be doing:<\/span><\/p>\n<blockquote>\n<p><span style=\"font-size: small;\">Plan on getting your database servers patched as soon as possible, which will include OS patches, SQL Server patches, and possible firmware or BIOS\/UEFI updates as they become available. <\/span><\/p>\n<p><span style=\"font-size: small;\">Be ready to do some workload and query tuning as necessary if your workload performance is negatively affected by these various patches and updates.<\/span><\/p>\n<p><span style=\"font-size: small;\">Think harder about upgrading to new hardware, a newer version of your OS, and a newer version of SQL Server that is still fully supported.<\/span><\/p>\n<p><span style=\"font-size: small;\">For personal and client workstation systems, you should be checking to see if there are any firmware or BIOS\/UEFI updates that become available, both for these issues and as a general best practice. <\/span><\/p>\n<p><font size=\"2\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4073119\/protect-against-speculative-execution-side-channel-vulnerabilities-in\">Windows Client Guidance for IT Pros to protect against speculative execution side-channel vulnerabilities<\/a><\/font><\/p>\n<\/blockquote>\n<p><font size=\"3\"><br \/><\/font><\/p>\n<p><font size=\"2\">I am collecting some resources about this issue from the server vendors as shown in the links below:<\/font><\/p>\n<p><font size=\"3\">Cisco<\/font><\/p>\n<blockquote>\n<p><font size=\"2\"><a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20180104-cpusidechannel\">CPU Side-Channel Information Disclosure Vulnerabilities<\/a><\/font><\/p>\n<\/blockquote>\n<p><font size=\"3\">Dell<\/font><\/p>\n<blockquote>\n<p><font size=\"2\">Microprocessor Side-Channel Attacks (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754): Impact on Dell EMC products (Dell Enterprise Servers, Storage and Networking)<\/font><\/p>\n<\/blockquote>\n<blockquote>\n<p><font size=\"2\"><a href=\"http:\/\/www.dell.com\/support\/article\/at\/de\/atdhs1\/sln308587\/microprocessor-side-channel-attacks--cve-2017-5715--cve-2017-5753--cve-2017-5754---impact-on-dell-products?lang=en\">Microprocessor Side-Channel Attacks (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754): Impact on Dell products<\/a>&nbsp; (This is for client hardware)<\/font><\/p>\n<\/blockquote>\n<p><font size=\"3\">Fujitsu<\/font><\/p>\n<blockquote>\n<p><a href=\"http:\/\/www.fujitsu.com\/global\/support\/products\/software\/security\/products-f\/jvn-93823979e.html\">CPU hardware vulnerable to side-channel attacks (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754)<\/a><\/p>\n<\/blockquote>\n<p><font size=\"3\">HPE<\/font><\/p>\n<blockquote>\n<p><font size=\"2\"><a href=\"http:\/\/h22208.www2.hpe.com\/eginfolib\/securityalerts\/SCAM\/Side_Channel_Analysis_Method.html\">Side Channel Analysis Method allows information disclosure in Microprocessors (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754)<\/a><\/font><\/p>\n<\/blockquote>\n<p><font size=\"3\">Huawei<\/font><\/p>\n<blockquote>\n<p><font size=\"2\"><a href=\"http:\/\/www.huawei.com\/en\/psirt\/security-notices\/huawei-sn-20180104-01-intel-en\">Security Notice &#8211; Statement on the Media Disclosure of the Security Vulnerabilities in the Intel CPU Architecture Design<\/a><\/font><\/p>\n<\/blockquote>\n<p><span style=\"font-size: small;\"><font size=\"3\">IBM<\/font><\/span><\/p>\n<blockquote>\n<p><span style=\"font-size: small;\"><font size=\"2\"><a href=\"https:\/\/www.ibm.com\/blogs\/psirt\/potential-cpu-security-issue\/\">Potential CPU Security Issue<\/a><\/font><\/span><\/p>\n<\/blockquote>\n<p><font size=\"3\">Lenovo<\/font><\/p>\n<blockquote>\n<p><font size=\"2\"><a href=\"https:\/\/support.lenovo.com\/us\/en\/solutions\/len-18282\">Reading Privileged Memory with a Side Channel<\/a><\/font><\/p>\n<\/blockquote>\n<p><span style=\"font-size: small;\"><font size=\"2\"><a href=\"https:\/\/www.ibm.com\/blogs\/psirt\/potential-cpu-security-issue\/\"><br \/><\/a><\/font><\/span><\/p>\n<p><span style=\"font-size: small;\">&nbsp;<\/span><\/p>\n<p><span style=\"font-size: small;\">&nbsp;<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the last couple of days, you have probably heard quite a bit of chatter and speculation about some newly disclosed ways to attack various processors. The initial reports were that only Intel processors were affected, but some sources indicate that some AMD and ARM processors are also vulnerable. Security researchers at Graz University (who [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,343,246,342],"tags":[366,367],"class_list":["post-1306","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","category-sql-server-2016","category-sql-server-2017","tag-meltdown","tag-spectre"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Microsoft SQL Server Updates for Meltdown and Spectre Exploits - Glenn Berry<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sqlskills.com\/blogs\/glenn\/microsoft-sql-server-updates-for-meltdown-and-spectre-exploits\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft SQL Server Updates for Meltdown and Spectre Exploits - Glenn Berry\" \/>\n<meta property=\"og:description\" content=\"Over the last couple of days, you have probably heard quite a bit of chatter and speculation about some newly disclosed ways to attack various processors. The initial reports were that only Intel processors were affected, but some sources indicate that some AMD and ARM processors are also vulnerable. Security researchers at Graz University (who [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sqlskills.com\/blogs\/glenn\/microsoft-sql-server-updates-for-meltdown-and-spectre-exploits\/\" \/>\n<meta property=\"og:site_name\" content=\"Glenn Berry\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-04T15:18:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-11T20:51:57+00:00\" \/>\n<meta name=\"author\" content=\"Glenn Berry\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Glenn Berry\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/microsoft-sql-server-updates-for-meltdown-and-spectre-exploits\/\",\"url\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/microsoft-sql-server-updates-for-meltdown-and-spectre-exploits\/\",\"name\":\"Microsoft SQL Server Updates for Meltdown and Spectre Exploits - Glenn Berry\",\"isPartOf\":{\"@id\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/#website\"},\"datePublished\":\"2018-01-04T15:18:31+00:00\",\"dateModified\":\"2020-01-11T20:51:57+00:00\",\"author\":{\"@id\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/#\/schema\/person\/57a8972435106bac7970692fcf5edfa7\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/microsoft-sql-server-updates-for-meltdown-and-spectre-exploits\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sqlskills.com\/blogs\/glenn\/microsoft-sql-server-updates-for-meltdown-and-spectre-exploits\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/microsoft-sql-server-updates-for-meltdown-and-spectre-exploits\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft SQL Server Updates for Meltdown and Spectre Exploits\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/#website\",\"url\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/\",\"name\":\"Glenn Berry\",\"description\":\"Semi-random musings about SQL Server performance\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/#\/schema\/person\/57a8972435106bac7970692fcf5edfa7\",\"name\":\"Glenn Berry\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/64bdac8830f25f2f8cc780f8a1286c66ff1182218009271e7a953639596f7e25?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/64bdac8830f25f2f8cc780f8a1286c66ff1182218009271e7a953639596f7e25?s=96&d=mm&r=g\",\"caption\":\"Glenn Berry\"},\"sameAs\":[\"https:\/\/www.sqlskills.com\/blogs\/glenn\/\"],\"url\":\"https:\/\/www.sqlskills.com\/blogs\/glenn\/author\/glenn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft SQL Server Updates for Meltdown and Spectre Exploits - Glenn Berry","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sqlskills.com\/blogs\/glenn\/microsoft-sql-server-updates-for-meltdown-and-spectre-exploits\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft SQL Server Updates for Meltdown and Spectre Exploits - Glenn Berry","og_description":"Over the last couple of days, you have probably heard quite a bit of chatter and speculation about some newly disclosed ways to attack various processors. The initial reports were that only Intel processors were affected, but some sources indicate that some AMD and ARM processors are also vulnerable. Security researchers at Graz University (who [&hellip;]","og_url":"https:\/\/www.sqlskills.com\/blogs\/glenn\/microsoft-sql-server-updates-for-meltdown-and-spectre-exploits\/","og_site_name":"Glenn Berry","article_published_time":"2018-01-04T15:18:31+00:00","article_modified_time":"2020-01-11T20:51:57+00:00","author":"Glenn Berry","twitter_misc":{"Written by":"Glenn Berry","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.sqlskills.com\/blogs\/glenn\/microsoft-sql-server-updates-for-meltdown-and-spectre-exploits\/","url":"https:\/\/www.sqlskills.com\/blogs\/glenn\/microsoft-sql-server-updates-for-meltdown-and-spectre-exploits\/","name":"Microsoft SQL Server Updates for Meltdown and Spectre Exploits - Glenn Berry","isPartOf":{"@id":"https:\/\/www.sqlskills.com\/blogs\/glenn\/#website"},"datePublished":"2018-01-04T15:18:31+00:00","dateModified":"2020-01-11T20:51:57+00:00","author":{"@id":"https:\/\/www.sqlskills.com\/blogs\/glenn\/#\/schema\/person\/57a8972435106bac7970692fcf5edfa7"},"breadcrumb":{"@id":"https:\/\/www.sqlskills.com\/blogs\/glenn\/microsoft-sql-server-updates-for-meltdown-and-spectre-exploits\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sqlskills.com\/blogs\/glenn\/microsoft-sql-server-updates-for-meltdown-and-spectre-exploits\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.sqlskills.com\/blogs\/glenn\/microsoft-sql-server-updates-for-meltdown-and-spectre-exploits\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sqlskills.com\/blogs\/glenn\/"},{"@type":"ListItem","position":2,"name":"Microsoft SQL Server Updates for Meltdown and Spectre Exploits"}]},{"@type":"WebSite","@id":"https:\/\/www.sqlskills.com\/blogs\/glenn\/#website","url":"https:\/\/www.sqlskills.com\/blogs\/glenn\/","name":"Glenn Berry","description":"Semi-random musings about SQL Server performance","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sqlskills.com\/blogs\/glenn\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sqlskills.com\/blogs\/glenn\/#\/schema\/person\/57a8972435106bac7970692fcf5edfa7","name":"Glenn Berry","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sqlskills.com\/blogs\/glenn\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/64bdac8830f25f2f8cc780f8a1286c66ff1182218009271e7a953639596f7e25?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/64bdac8830f25f2f8cc780f8a1286c66ff1182218009271e7a953639596f7e25?s=96&d=mm&r=g","caption":"Glenn Berry"},"sameAs":["https:\/\/www.sqlskills.com\/blogs\/glenn\/"],"url":"https:\/\/www.sqlskills.com\/blogs\/glenn\/author\/glenn\/"}]}},"_links":{"self":[{"href":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-json\/wp\/v2\/posts\/1306","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-json\/wp\/v2\/comments?post=1306"}],"version-history":[{"count":0,"href":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-json\/wp\/v2\/posts\/1306\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-json\/wp\/v2\/media?parent=1306"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-json\/wp\/v2\/categories?post=1306"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sqlskills.com\/blogs\/glenn\/wp-json\/wp\/v2\/tags?post=1306"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}