Now, the silicon giant has addressed the problem in a new post and advised users not to install security patches currently available for the Meltdown and Spectre bugs until they figure out some solution.
“We recommend that OEMs, cloud service providers, system manufacturers, software vendors and end users stop deployment of current versions, as they may introduce higher than expected reboots and other unpredictable system behavior,” wrote Intel’s executive VP Navin Shenoy.
Shenoy also said they had found the root cause for Broadwell and Haswell platforms. They will test an early version of the fix with their OEM partners over the weekend after which a final version of the security fix is to be released. They are also working on the security patches for other affected chips based on Ivy Bridge, Sandy Bridge, Skylake, Kaby Lake architectures. The Meltdown and Spectre patches haven’t caused problems just for Intel.
A few days back, Microsoft’s had to halt patches for AMD-based systems after users’ machines went unbootable. Similar was the case when Canonical issued a fix for Ubuntu Linux this month.
Also Read: Wehe: This App Tells If Your ISP Is Violating Net Neutrality Or Not