Chip manufacturer Intel does not advise users & partners to install the latest patches for the Spectre & Meltdown vulnerabilities in CPU's.
The company admits that the reboot issues caused by the updates are more serious than initially thought.
We have now identified the root cause of the reboot issue impacting Broadwell and Haswell platforms, and made good progress in developing a solution to address it. Based on this, we are updating our guidance for customers and partners:
We recommend that OEMs, Cloud service providers, system manufacturers, software vendors and end users stop deployment of current versions on the below platforms, as they may introduce higher than expected reboots and other unpredictable system behavior.
We also ask that our industry partners focus efforts on testing early versions of the updated solution for Broadwell and Haswell we started rolling out this weekend, so we can accelerate its release. We expect to share more details on timing later this week.
For those concerned about system stability while we finalize the updated solutions, we are also working with our OEM partners on the option to utilize a previous version of microcode that does not display these issues, but removes the Variant 2 (Spectre) mitigations. This would be delivered via a BIOS update, and would not impact mitigations for Variant 1 (Spectre) and Variant 3 (Meltdown).
All the major partners, Microsoft, VMware, HP, IBM have already recalled patches as they cause issues.
It is there for strongly advised to be very careful updating the systems.
If you are not sure that your system is updating itself, or not sure that you are installing the correct patches, please contact us.
We are glad to assist you with this difficult task.