What a wonderful beginning of the year?

Meltdown/Specter, 2 serious vulnerabilities.
Meltdown vulnerability is “only” on Intel’s CPUs, while Spectre is found in addition to Intel’s CPUs also with AMD and ARM CPUs.
Info: A Simple Explanation of the Differences Between Meltdown and Spectre

Many operating system manufacturers are in the process of developing software updates to protect against the Meltdown vulnerability. But due to the fact that information about these vulnerabilities leaked to the media prematurely, more or less many manufacturers were forced to release their updates prematurely, which in turn could have caused problems for many users.
There have been reported problems for Microsoft Azure customers after Microsoft updated their system.
Other users who installed updates have been affected by BSOD (Windows crashes, displays “blue screen”), this in relation to the fact that some AntiVirus products make unsupported calls to Windows kernel memory. Here, one must ensure that the AntiVirus is supported/updated, and also ensure that the following registry key is in the registry before installing the update:

Value Name ="cadca5fe-87d3-4b96-b7fb-a231484277cc"

More information in the following links:

Important information regarding the Windows security updates released on January 3, 2018 and anti-virus software.

List of AntiVirus products and how they “support” the Windows update.

Windows Server guidance to protect against speculative execution side-channel vulnerabilities.

However, as this is hardware vulnerabilities, it may not be enough to update the operating system only, but you must also update the firmware for the hardware.
US-CERT has put together a list of manufacturers who have information/recommendation about their hardware: