Both updates must be done to flip the bit properly!This issue affected only 64-bit versions of Windows 7 and Windows Server 2008 R2, Frisk said. We say affected because Microsoft patched the bug by flipping the PML4 permission bit back to its original value in this month's Patch Tuesday.
Windows 7 and Server 2008 R2 users should make sure they installed both the January 2018 and March 2018 Patch Tuesday releases.
Windows 10 or 8.1 systems were never affected or put at risk. Physical access is required to exploit the bug
Statistics: Posted by burger2227 — Sat Mar 31, 2018 4:07 pm
Statistics: Posted by burger2227 — Thu Mar 08, 2018 8:31 pm
Statistics: Posted by lorein0688 — Thu Mar 08, 2018 7:09 am
Windows 7 computers without an antivirus scanner won’t receive the latest security updates automatically. These systems won’t receive the security updates of January and February which also means they are not protected against Spectre and Meltdown based attacks.
This can be done manually, by setting HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\QualityCompat to “cadca5fe-87d3-4b96-b7fb-a231484277cc” as dword:00000000.
Statistics: Posted by burger2227 — Wed Feb 28, 2018 6:34 pm
Statistics: Posted by burger2227 — Wed Feb 08, 2017 11:52 am
Statistics: Posted by burger2227 — Wed Nov 30, 2016 4:26 pm
Statistics: Posted by burger2227 — Mon Nov 21, 2016 3:11 pm
Starting in February 2017, Microsoft intends to add older fixes from before the current month to the packages. Over the course of several months, the cumulative updates will become bigger and bigger, incorporating an ever larger quantity of the available Windows 7 and Windows 8.1 fixes. The ultimate goal is that these cumulative updates will be sufficient to get a PC completely up to date. Eventually, this will mean that you'll no longer have to install hundreds of individual updates across multiple reboots to get a fresh install patched.
Statistics: Posted by burger2227 — Fri Oct 14, 2016 2:03 pm
Statistics: Posted by burger2227 — Wed Aug 24, 2016 4:37 pm