{"id":221875,"date":"2015-01-28T18:38:02","date_gmt":"2015-01-28T17:38:02","guid":{"rendered":"https:\/\/cms.galaxiemedia.fr\/tomshardware\/2015\/01\/28\/ghost-une-vulnerabilite-dans-glibc-fait-peur-a-linux\/"},"modified":"2023-06-23T14:31:54","modified_gmt":"2023-06-23T12:31:54","slug":"ghost-une-vulnerabilite-dans-glibc-fait-peur-a-linux","status":"publish","type":"post","link":"https:\/\/www.tomshardware.fr\/ghost-une-vulnerabilite-dans-glibc-fait-peur-a-linux\/","title":{"rendered":"GHOST : Une vuln\u00e9rabilit\u00e9 dans Glibc fait peur \u00e0 Linux"},"content":{"rendered":"

\"Image<\/span><\/span>GHOST<\/strong>, c\u2019est l\u2019histoire d\u2019une faille <\/strong>corrig\u00e9e en 2013 qui ressurgit 18 mois plus tard. D\u00e9couverte par Qualys (une soci\u00e9t\u00e9 sp\u00e9cialis\u00e9e dans la s\u00e9curit\u00e9), cette vuln\u00e9rabilit\u00e9 \u00ab\u00a0CVE-2015-0235<\/a>\u00a0\u00bb est en effet pr\u00e9sente dans la biblioth\u00e8que C de GNU\/Linux<\/strong> (glibc) depuis la version 2.2 publi\u00e9e en novembre 2000. Mais elle a d\u00e9j\u00e0 \u00e9t\u00e9 corrig\u00e9e via un patch publi\u00e9 en mai 2013, soit entre les versions 2.17 et 2.18 de glibc<\/strong>. Dans ce cas, \u00a0pourquoi est-elle devenue d\u2019un coup si inqui\u00e9tante\u00a0?<\/p>\n<\/p>\n

Tout simplement parce que lors de la publication du correctif, celui-ci n\u2019a pas \u00e9t\u00e9 class\u00e9 comme bulletin de s\u00e9curit\u00e9. Du coup, la majorit\u00e9 des distributions stables et b\u00e9n\u00e9ficiant d\u2019un support \u00e0 long terme (par exemple Debian 7, Red Hat Enterprise Linux 5, 6 et 7, CentOS 6 et 7 ou encore Ubuntu 12.04) sont expos\u00e9es \u00e0 cette faille s\u00e9v\u00e8re. Car le risque est bien r\u00e9el\u00a0: \u00e0 cause d\u2019un d\u00e9passement de m\u00e9moire tampon (ou \u00ab\u00a0buffer overflow\u00a0\u00bb), GHOST autorise l\u2019ex\u00e9cution de code \u00e0 distance, et donc l\u2019exploitation d\u2019une machine par un pirate.<\/p>\n<\/p>\n

Pr\u00e9sente dans la fonction __nss_hostname_digits_dots()<\/em> de glibc, elle-m\u00eame utilis\u00e9e par les fonctions gethostbyname()<\/em> et gethostbyname2()<\/em> (d\u2019o\u00f9 le nom de la faille, je vois que vous suivez), cette vuln\u00e9rabilit\u00e9 permet \u00e0 un utilisateur malintentionn\u00e9 d\u2019obtenir un acc\u00e8s complet \u00e0 une machine, simplement en envoyant un mail\u00a0! Les serveurs de messagerie sont donc particuli\u00e8rement vis\u00e9s, mais \u00e9galement les modems-routeurs ainsi que les NAS. La biblioth\u00e8que glibc est en effet utilis\u00e9e dans tous les syst\u00e8mes informatiques fonctionnant sous Linux, ce qui fait autant d\u2019appareils potentiellement vuln\u00e9rables (s\u2019ils ne sont pas \u00e0 jour), m\u00eame si cette faille apparait \u00e0 priori moins grave que Shellshock ou Heartbleed car plus difficile \u00e0 exploiter. Les diff\u00e9rents \u00e9diteurs comme Red Hat sont tout de m\u00eame d\u00e9j\u00e0 en train de publier des patchs pour leurs syst\u00e8mes, tout comme certains constructeurs de NAS.<\/p>\n<\/p>\n

Plusieurs questions restent tout de m\u00eame en suspend\u00a0: pourquoi\u00a0 cette faille n\u2019a pas \u00e9t\u00e9 class\u00e9e comme critique en 2013, ce qui aurait oblig\u00e9 les \u00e9diteurs \u00e0 mettre \u00e0 jour leurs distributions avec un support long terme\u00a0? Et pourquoi continuer \u00e0 utiliser des fonctions d\u00e9pass\u00e9es \u2013 elles ne permettent pas de faire de l\u2019IPv6 \u2013 et qui devraient depuis longtemps \u00eatre remplac\u00e9es par getaddrinfo()<\/em>, comme l\u2019expliquent certains chercheurs<\/a>\u00a0?<\/p>\n<\/p>\n

\"Image<\/span><\/span><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"

GHOST, c\u2019est l\u2019histoire d\u2019une faille corrig\u00e9e en 2013 qui ressurgit 18 mois plus tard. D\u00e9couverte par Qualys (une soci\u00e9t\u00e9 sp\u00e9cialis\u00e9e dans la s\u00e9curit\u00e9), cette vuln\u00e9rabilit\u00e9 \u00ab\u00a0CVE-2015-0235\u00a0\u00bb est en effet pr\u00e9sente dans la biblioth\u00e8que C de\u2026<\/p>","protected":false},"author":9,"featured_media":221876,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[487,4094,4112],"tags":[],"hubs":[],"class_list":["post-221875","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-linux","category-securite"],"acf":{"post_show_excerpt":false,"post_source":{"title":"Tom's Hardware FR","url":"https:\/\/www.tomshardware.fr\/","target":""}},"yoast_head":"\nGHOST : Une vuln\u00e9rabilit\u00e9 dans Glibc fait peur \u00e0 Linux<\/title>\n<meta name=\"description\" content=\"GHOST, c\u2019est l\u2019histoire d\u2019une faille corrig\u00e9e en 2013 qui ressurgit 18 mois plus tard. D\u00e9couverte par Qualys (une soci\u00e9t\u00e9 sp\u00e9cialis\u00e9e dans la s\u00e9curit\u00e9), cette vuln\u00e9rabilit\u00e9 \u00ab\u00a0CVE-2015-0235\u00a0\u00bb est en effet pr\u00e9sente dans la biblioth\u00e8que C de GNU\/Linux...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tomshardware.fr\/ghost-une-vulnerabilite-dans-glibc-fait-peur-a-linux\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GHOST : Une vuln\u00e9rabilit\u00e9 dans Glibc fait peur \u00e0 Linux\" \/>\n<meta property=\"og:description\" content=\"GHOST, c\u2019est l\u2019histoire d\u2019une faille corrig\u00e9e en 2013 qui ressurgit 18 mois plus tard. D\u00e9couverte par Qualys (une soci\u00e9t\u00e9 sp\u00e9cialis\u00e9e dans la s\u00e9curit\u00e9), cette vuln\u00e9rabilit\u00e9 \u00ab\u00a0CVE-2015-0235\u00a0\u00bb est en effet pr\u00e9sente dans la biblioth\u00e8que C de GNU\/Linux...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tomshardware.fr\/ghost-une-vulnerabilite-dans-glibc-fait-peur-a-linux\/\" \/>\n<meta property=\"og:site_name\" content=\"Tom\u2019s Hardware\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TomsHardwareFrance\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/3pi141592653589793\" \/>\n<meta property=\"article:published_time\" content=\"2015-01-28T17:38:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-23T12:31:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tomshardware.fr\/content\/uploads\/sites\/3\/2015\/01\/ghost-flaw-logo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Yannick Guerrini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@___CgS___\" \/>\n<meta name=\"twitter:site\" content=\"@tomshardware_fr\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tomshardware.fr\/ghost-une-vulnerabilite-dans-glibc-fait-peur-a-linux\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tomshardware.fr\/ghost-une-vulnerabilite-dans-glibc-fait-peur-a-linux\/\"},\"author\":{\"name\":\"Yannick Guerrini\",\"@id\":\"https:\/\/www.tomshardware.fr\/#\/schema\/person\/4bb9824d33fc3a6f91a8cf53431e7318\"},\"headline\":\"GHOST : Une vuln\u00e9rabilit\u00e9 dans Glibc fait peur \u00e0 Linux\",\"datePublished\":\"2015-01-28T17:38:02+00:00\",\"dateModified\":\"2023-06-23T12:31:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tomshardware.fr\/ghost-une-vulnerabilite-dans-glibc-fait-peur-a-linux\/\"},\"wordCount\":413,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.tomshardware.fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.tomshardware.fr\/ghost-une-vulnerabilite-dans-glibc-fait-peur-a-linux\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tomshardware.fr\/content\/uploads\/sites\/3\/2015\/01\/ghost-flaw-logo.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"Linux\",\"S\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.tomshardware.fr\/ghost-une-vulnerabilite-dans-glibc-fait-peur-a-linux\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tomshardware.fr\/ghost-une-vulnerabilite-dans-glibc-fait-peur-a-linux\/\",\"url\":\"https:\/\/www.tomshardware.fr\/ghost-une-vulnerabilite-dans-glibc-fait-peur-a-linux\/\",\"name\":\"GHOST : Une vuln\u00e9rabilit\u00e9 dans Glibc fait peur \u00e0 Linux\",\"isPartOf\":{\"@id\":\"https:\/\/www.tomshardware.fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tomshardware.fr\/ghost-une-vulnerabilite-dans-glibc-fait-peur-a-linux\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tomshardware.fr\/ghost-une-vulnerabilite-dans-glibc-fait-peur-a-linux\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tomshardware.fr\/content\/uploads\/sites\/3\/2015\/01\/ghost-flaw-logo.jpg\",\"datePublished\":\"2015-01-28T17:38:02+00:00\",\"dateModified\":\"2023-06-23T12:31:54+00:00\",\"description\":\"GHOST, c\u2019est l\u2019histoire d\u2019une faille corrig\u00e9e en 2013 qui ressurgit 18 mois plus tard. D\u00e9couverte par Qualys (une soci\u00e9t\u00e9 sp\u00e9cialis\u00e9e dans la s\u00e9curit\u00e9), cette vuln\u00e9rabilit\u00e9 \u00ab\u00a0CVE-2015-0235\u00a0\u00bb est en effet pr\u00e9sente dans la biblioth\u00e8que C de GNU\/Linux...\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tomshardware.fr\/ghost-une-vulnerabilite-dans-glibc-fait-peur-a-linux\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.tomshardware.fr\/ghost-une-vulnerabilite-dans-glibc-fait-peur-a-linux\/#primaryimage\",\"url\":\"https:\/\/www.tomshardware.fr\/content\/uploads\/sites\/3\/2015\/01\/ghost-flaw-logo.jpg\",\"contentUrl\":\"https:\/\/www.tomshardware.fr\/content\/uploads\/sites\/3\/2015\/01\/ghost-flaw-logo.jpg\",\"width\":500,\"height\":350},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tomshardware.fr\/#website\",\"url\":\"https:\/\/www.tomshardware.fr\/\",\"name\":\"Tom\u2019s Hardware\",\"description\":\"Toute l'info hardware et gaming !\",\"publisher\":{\"@id\":\"https:\/\/www.tomshardware.fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tomshardware.fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tomshardware.fr\/#organization\",\"name\":\"Tom\u2019s Hardware\",\"url\":\"https:\/\/www.tomshardware.fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.tomshardware.fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tomshardware.fr\/content\/uploads\/sites\/3\/2023\/06\/th.png\",\"contentUrl\":\"https:\/\/www.tomshardware.fr\/content\/uploads\/sites\/3\/2023\/06\/th.png\",\"width\":1000,\"height\":1000,\"caption\":\"Tom\u2019s Hardware\"},\"image\":{\"@id\":\"https:\/\/www.tomshardware.fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TomsHardwareFrance\/\",\"https:\/\/x.com\/tomshardware_fr\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tomshardware.fr\/#\/schema\/person\/4bb9824d33fc3a6f91a8cf53431e7318\",\"name\":\"Yannick Guerrini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.tomshardware.fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a08bb358c2a9fc36265e8f3225c5de08?s=64&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a08bb358c2a9fc36265e8f3225c5de08?s=64&d=mm&r=g\",\"caption\":\"Yannick Guerrini\"},\"description\":\"Tomb\u00e9 dans une marmite remplie de MO5 \u00e9tant petit, je n'ai plus quitt\u00e9 le monde des nouvelles technologies depuis cette \u00e9poque. Sp\u00e9cialiste en CPU\/GPU et tout ce qui est exotique (stockage, virtualisation, chiffrement et Linux\/BSD). Je suis bloqu\u00e9 au XXi\u00e8me si\u00e8cle c\u00f4t\u00e9 gaming : Doom et Duke Nukem 3D, tous les autres ne sont qu'erstaz.\",\"sameAs\":[\"https:\/\/www.facebook.com\/3pi141592653589793\",\"https:\/\/www.linkedin.com\/in\/cgs3141592653589793\/\",\"https:\/\/x.com\/___CgS___\",\"https:\/\/fr.wikipedia.org\/wiki\/Utilisateur:Cgsyannick\"],\"url\":\"https:\/\/www.tomshardware.fr\/author\/yannick-guerrini\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"GHOST : Une vuln\u00e9rabilit\u00e9 dans Glibc fait peur \u00e0 Linux","description":"GHOST, c\u2019est l\u2019histoire d\u2019une faille corrig\u00e9e en 2013 qui ressurgit 18 mois plus tard. D\u00e9couverte par Qualys (une soci\u00e9t\u00e9 sp\u00e9cialis\u00e9e dans la s\u00e9curit\u00e9), cette vuln\u00e9rabilit\u00e9 \u00ab\u00a0CVE-2015-0235\u00a0\u00bb est en effet pr\u00e9sente dans la biblioth\u00e8que C de GNU\/Linux...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tomshardware.fr\/ghost-une-vulnerabilite-dans-glibc-fait-peur-a-linux\/","og_locale":"fr_FR","og_type":"article","og_title":"GHOST : Une vuln\u00e9rabilit\u00e9 dans Glibc fait peur \u00e0 Linux","og_description":"GHOST, c\u2019est l\u2019histoire d\u2019une faille corrig\u00e9e en 2013 qui ressurgit 18 mois plus tard. D\u00e9couverte par Qualys (une soci\u00e9t\u00e9 sp\u00e9cialis\u00e9e dans la s\u00e9curit\u00e9), cette vuln\u00e9rabilit\u00e9 \u00ab\u00a0CVE-2015-0235\u00a0\u00bb est en effet pr\u00e9sente dans la biblioth\u00e8que C de GNU\/Linux...","og_url":"https:\/\/www.tomshardware.fr\/ghost-une-vulnerabilite-dans-glibc-fait-peur-a-linux\/","og_site_name":"Tom\u2019s Hardware","article_publisher":"https:\/\/www.facebook.com\/TomsHardwareFrance\/","article_author":"https:\/\/www.facebook.com\/3pi141592653589793","article_published_time":"2015-01-28T17:38:02+00:00","article_modified_time":"2023-06-23T12:31:54+00:00","og_image":[{"width":500,"height":350,"url":"https:\/\/www.tomshardware.fr\/content\/uploads\/sites\/3\/2015\/01\/ghost-flaw-logo.jpg","type":"image\/jpeg"}],"author":"Yannick Guerrini","twitter_card":"summary_large_image","twitter_creator":"@___CgS___","twitter_site":"@tomshardware_fr","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tomshardware.fr\/ghost-une-vulnerabilite-dans-glibc-fait-peur-a-linux\/#article","isPartOf":{"@id":"https:\/\/www.tomshardware.fr\/ghost-une-vulnerabilite-dans-glibc-fait-peur-a-linux\/"},"author":{"name":"Yannick Guerrini","@id":"https:\/\/www.tomshardware.fr\/#\/schema\/person\/4bb9824d33fc3a6f91a8cf53431e7318"},"headline":"GHOST : Une vuln\u00e9rabilit\u00e9 dans Glibc fait peur \u00e0 Linux","datePublished":"2015-01-28T17:38:02+00:00","dateModified":"2023-06-23T12:31:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tomshardware.fr\/ghost-une-vulnerabilite-dans-glibc-fait-peur-a-linux\/"},"wordCount":413,"commentCount":0,"publisher":{"@id":"https:\/\/www.tomshardware.fr\/#organization"},"image":{"@id":"https:\/\/www.tomshardware.fr\/ghost-une-vulnerabilite-dans-glibc-fait-peur-a-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tomshardware.fr\/content\/uploads\/sites\/3\/2015\/01\/ghost-flaw-logo.jpg","articleSection":["Actualit\u00e9","Linux","S\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.tomshardware.fr\/ghost-une-vulnerabilite-dans-glibc-fait-peur-a-linux\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.tomshardware.fr\/ghost-une-vulnerabilite-dans-glibc-fait-peur-a-linux\/","url":"https:\/\/www.tomshardware.fr\/ghost-une-vulnerabilite-dans-glibc-fait-peur-a-linux\/","name":"GHOST : Une vuln\u00e9rabilit\u00e9 dans Glibc fait peur \u00e0 Linux","isPartOf":{"@id":"https:\/\/www.tomshardware.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tomshardware.fr\/ghost-une-vulnerabilite-dans-glibc-fait-peur-a-linux\/#primaryimage"},"image":{"@id":"https:\/\/www.tomshardware.fr\/ghost-une-vulnerabilite-dans-glibc-fait-peur-a-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tomshardware.fr\/content\/uploads\/sites\/3\/2015\/01\/ghost-flaw-logo.jpg","datePublished":"2015-01-28T17:38:02+00:00","dateModified":"2023-06-23T12:31:54+00:00","description":"GHOST, c\u2019est l\u2019histoire d\u2019une faille corrig\u00e9e en 2013 qui ressurgit 18 mois plus tard. D\u00e9couverte par Qualys (une soci\u00e9t\u00e9 sp\u00e9cialis\u00e9e dans la s\u00e9curit\u00e9), cette vuln\u00e9rabilit\u00e9 \u00ab\u00a0CVE-2015-0235\u00a0\u00bb est en effet pr\u00e9sente dans la biblioth\u00e8que C de GNU\/Linux...","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tomshardware.fr\/ghost-une-vulnerabilite-dans-glibc-fait-peur-a-linux\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.tomshardware.fr\/ghost-une-vulnerabilite-dans-glibc-fait-peur-a-linux\/#primaryimage","url":"https:\/\/www.tomshardware.fr\/content\/uploads\/sites\/3\/2015\/01\/ghost-flaw-logo.jpg","contentUrl":"https:\/\/www.tomshardware.fr\/content\/uploads\/sites\/3\/2015\/01\/ghost-flaw-logo.jpg","width":500,"height":350},{"@type":"WebSite","@id":"https:\/\/www.tomshardware.fr\/#website","url":"https:\/\/www.tomshardware.fr\/","name":"Tom\u2019s Hardware","description":"Toute l'info hardware et gaming !","publisher":{"@id":"https:\/\/www.tomshardware.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tomshardware.fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.tomshardware.fr\/#organization","name":"Tom\u2019s Hardware","url":"https:\/\/www.tomshardware.fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.tomshardware.fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.tomshardware.fr\/content\/uploads\/sites\/3\/2023\/06\/th.png","contentUrl":"https:\/\/www.tomshardware.fr\/content\/uploads\/sites\/3\/2023\/06\/th.png","width":1000,"height":1000,"caption":"Tom\u2019s Hardware"},"image":{"@id":"https:\/\/www.tomshardware.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TomsHardwareFrance\/","https:\/\/x.com\/tomshardware_fr"]},{"@type":"Person","@id":"https:\/\/www.tomshardware.fr\/#\/schema\/person\/4bb9824d33fc3a6f91a8cf53431e7318","name":"Yannick Guerrini","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.tomshardware.fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a08bb358c2a9fc36265e8f3225c5de08?s=64&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a08bb358c2a9fc36265e8f3225c5de08?s=64&d=mm&r=g","caption":"Yannick Guerrini"},"description":"Tomb\u00e9 dans une marmite remplie de MO5 \u00e9tant petit, je n'ai plus quitt\u00e9 le monde des nouvelles technologies depuis cette \u00e9poque. Sp\u00e9cialiste en CPU\/GPU et tout ce qui est exotique (stockage, virtualisation, chiffrement et Linux\/BSD). Je suis bloqu\u00e9 au XXi\u00e8me si\u00e8cle c\u00f4t\u00e9 gaming : Doom et Duke Nukem 3D, tous les autres ne sont qu'erstaz.","sameAs":["https:\/\/www.facebook.com\/3pi141592653589793","https:\/\/www.linkedin.com\/in\/cgs3141592653589793\/","https:\/\/x.com\/___CgS___","https:\/\/fr.wikipedia.org\/wiki\/Utilisateur:Cgsyannick"],"url":"https:\/\/www.tomshardware.fr\/author\/yannick-guerrini\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tomshardware.fr\/wp-json\/wp\/v2\/posts\/221875"}],"collection":[{"href":"https:\/\/www.tomshardware.fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tomshardware.fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tomshardware.fr\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tomshardware.fr\/wp-json\/wp\/v2\/comments?post=221875"}],"version-history":[{"count":0,"href":"https:\/\/www.tomshardware.fr\/wp-json\/wp\/v2\/posts\/221875\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tomshardware.fr\/wp-json\/wp\/v2\/media\/221876"}],"wp:attachment":[{"href":"https:\/\/www.tomshardware.fr\/wp-json\/wp\/v2\/media?parent=221875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tomshardware.fr\/wp-json\/wp\/v2\/categories?post=221875"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tomshardware.fr\/wp-json\/wp\/v2\/tags?post=221875"},{"taxonomy":"hubs","embeddable":true,"href":"https:\/\/www.tomshardware.fr\/wp-json\/wp\/v2\/hubs?post=221875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}