This bug was fixed in the package linux - 5.4.0-37.41
--------------- linux (5.4.0-37.41) focal; urgency=medium
* CVE-2020-0543 - SAUCE: x86/speculation/spectre_v2: Exclude Zhaoxin CPUs from SPECTRE_V2 - SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id - SAUCE: x86/cpu: Add 'table' argument to cpu_matches() - SAUCE: x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation - SAUCE: x86/speculation: Add SRBDS vulnerability and mitigation documentation - SAUCE: x86/speculation: Add Ivy Bridge to affected list
-- Marcelo Henrique Cerri <email address hidden> Wed, 03 Jun 2020 11:24:23 -0300
This bug was fixed in the package linux - 5.4.0-37.41
---------------
linux (5.4.0-37.41) focal; urgency=medium
* CVE-2020-0543 /spectre_ v2: Exclude Zhaoxin CPUs from SPECTRE_V2
- SAUCE: x86/speculation
- SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
- SAUCE: x86/cpu: Add 'table' argument to cpu_matches()
- SAUCE: x86/speculation: Add Special Register Buffer Data Sampling (SRBDS)
mitigation
- SAUCE: x86/speculation: Add SRBDS vulnerability and mitigation documentation
- SAUCE: x86/speculation: Add Ivy Bridge to affected list
-- Marcelo Henrique Cerri <email address hidden> Wed, 03 Jun 2020 11:24:23 -0300