The company said it has started rolling out an early version of the updated solution to partners for testing and will make a final release that will become available after the testing has been completed.
The company had already acknowledged that the patch could lead to unexpected reboots, but had previously publicly advised users to install it anyway.
Intel Corp. reported on Monday that it has discovered the cause of reboot issues that affected its Broadwell and Haswell processors after patches were applied created to fix potential side-channel "speculative execution" exploits.
There are still several Intel chip models that are reportedly experiencing rebooting issues, including its second-generation Sandy Bridge, third-generation Ivy Bridge, sixth-generation Skylake, and seventh-generation Kaby Lake models.
Each time news trickles out about just how insane this unprecedented industry event really is, cloud vendors and data center managers consider buying servers from AMD or ARM vendors the next time their systems need to be replaced.
All last week, users reported computers spontaneously rebooting after installing Intel's Spectre/Meltdown patch. OEMs have to test Intel's updates first to ensure that problem-free firmware updates get out the door to end users.
The patches, which the company spent months crafting, cause computers to reboot more often than normal. To check whether your system may have a problem, check the full list of processors at the Intel Product Security center.
In short, while computing device vendors and other Intel partners work with Intel to fix these issues at the top level and hopefully avoid these faulty patches, the firm also asking end users to stay away from the latest processor updates.
The statement is the latest update from Intel on its messy follow up to the Spectre and Meltdown exploits, which were revealed two weeks ago and affected chips from multiple vendors. However, it appears to be problematic for those on Broadwell or Haswell.