Intel users warned not to install latest security patch

Share on facebook
Share on twitter
Share on linkedin
Share on email

The Meltdown/Spectre vulnerability is causing massive issues but not because it’s being exploited.

No, the problems that are being caused are due to firms trying to patch the holes as quickly as possible and as a result Intel has had to ask users not to download its latest patch.

The problems surfaced last week when a number of Team Blue users on the Broadwell and Haswell platforms found their systems unexpectedly rebooting.

Thankfully Intel has already identified the problem and is currently testing a solution that should see a final release soon.

In the meantime however Intel has recommended that if you haven’t updated yet that you put a pin in it.

“We recommend that OEMs [original equipment manufacturers], cloud service providers, system manufacturers, software vendors and end users stop deployment of current versions, as they may introduce higher than expected reboots and other unpredictable system behavior,” executive vice president and general manager of Intel’s Data Center Group Navin Shenoy said in a statement.

Users are able to roll back to a previous version of Intel’s microcode though this will remove the Variant 2 (Spectre) mitigation.

The full list of processors (end-user and datacenter/workstation) that might experience system instability can be viewed in the PDF below.

Brendyn Lotz

Brendyn Lotz

Brendyn Lotz writes news, reviews, and opinion pieces for Hypertext. His interests include SMEs, innovation on the African continent, cybersecurity, blockchain, games, geek culture and YouTube.