Intel has warned users not to use the patch it issued last week to mitigate the risks of the Spectre CPU security flaw on Intel CPUs.
PC users running Intel CPUs had been reporting that the chipmaker's initial Spectre patch was causing random reboots of their computers running recent Broadwell and Haswell generation CPUs.
The quality of the patch had also attracted the attention of Linux creator Linus Torvalds, who described it as "garbage".
Rather than bury its head in the sand, Intel has done the sensible thing - albeit one week later - and advised people and supplier partners to stop using the bork-ridden patch.
"We recommend that OEMs, cloud service providers, system manufacturers, software vendors and end users stop deployment of current versions, as they may introduce higher than expected reboots and other unpredictable system behaviour," Navin Shenoy, general manager of the Data Centre Group at Intel explained.
But Spectre can't be ignored. So Intel apparently figured out the "root cause" of the reboots and is now working on another patch, putting it through its paces to ensure that when it rolls out, it doesn't add to the problems Spectre seems to keep kicking up.
"We ask that our industry partners focus efforts on testing early versions of the updated solution so we can accelerate its release," added Shenoy, who noted more information about the patch will be revealed shortly.
It's worth noting that Spectre isn't as dangerous a flaw to cyber security as Meltdown, which affects Intel CPUs and ARM's A-75 processors.
But Spectre seems to be the one that's causing Intel the biggest headache; it managed to plug Meltdown pretty swiftly but at some performance cost to its processors.
While there have been no reports of either Spectre or Meltdown being exploited in the wild, it's only a matter of time.
In fear of future shortage - or in preparation for its own electric car project?
New Spectre microcode patches released by Intel to fix security flaws in Skylake, Kaby Lake and Coffee Lake CPUs
But if you're running anything older you'll have to wait
Powered by servers based on Qualcomm's scalable 48-core Centriq 2400 10nm CPUs
Malware has been in circulation for more than a year