Sometimes a cure can be worse than the disease. This seems to be so in the case of the Meltdown patches for the 64-bit versions of Windows 7 and Windows Server 2008 R2. Earlier this month, security researcher Ulf Frisk discovered the Meltdown patches created a gaping kernel vulnerability in these operating systems. A bug introduced by these patches enabled user-level application to not only read but also write data to the operating system's kernel memory.
Frisk says that Microsoft's Meltdown patch (for CVE-2017-5754) —released in the January 2018 Patch Tuesday— accidentally flipped a bit that controls the access permission for kernel memory. Frisk explains:
In short - the User/Supervisor permission bit was set to User in the PML4 self-referencing entry. This made the page tables available to user mode code in every process. The page tables should normally only be accessible by the kernel itself.
The PML4 is the base of the 4-level in-memory page table hierarchy that the CPU Memory Management Unit (MMU) uses to translate the virtual addresses of a process into physical memory addresses in RAM.
Microsoft quietly patched the bugs earlier this month, via the March Patch Tuesday rollout.