The new patches are for 6th, 7th and 8th generation Intel processors and the latest Intel Core X-series processor family, according to a blog post by Navin Shenoy, executive vice-president and general manager of the company's Data Centre Group.
Last month, Shenoy asked OEMs, cloud service providers, system manufacturers, software vendors and end users to hold off from applying the first patches because they could cause reboots and other unpredictable behaviour.
Those patches caused crashes when applied to systems which had Broadwell and Haswell processors.
Meltdown removes the barrier between user applications and sensitive parts of the operating system. Spectre, which is also reportedly found in some AMD and ARM processors, can trick vulnerable applications into leaking the contents of their memory.
In the post accompanying the announcement of the second set of patches, Shenoy said: "The new microcode will be made available in most cases through OEM firmware updates... There is also a comprehensive schedule and current status for planned microcode updates available online.
"We are mindful of the fact that, in some cases, there are multiple mitigation techniques available that may provide protection against these exploits. This includes 'Retpoline', a Google-developed mitigation technique for Variant 2 (of the Spectre flaw).
As iTWire reported recently, Intel faces a total of 33 lawsuits over the two flaws. Additionally, the Boston law firm of Block & Leviton is preparing a class action lawsuit against Intel chief executive Brian Krzanich for allegedly selling a vast majority of his Intel stock after the company was notified of the two security flaws.