DescriptionImproper input validation in some Intel(R) Graphics Drivers for Windows* before version and before Linux kernel version 5.5 may allow a privileged user to potentially enable a denial of service via local access.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitylow

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
firmware-nonfree (PTS)stretch/non-free20161130-5vulnerable
bullseye/non-free, sid/non-free20210315-2fixed
stretch/non-free (security)20190114-2~deb9u1vulnerable
linux (PTS)stretch4.9.228-1vulnerable
stretch (security)4.9.258-1vulnerable
buster (security)4.19.171-2vulnerable
bullseye, sid5.10.28-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


[buster] - firmware-nonfree <no-dsa> (Non-free not supported)
Short of details:
Per Intel, this was fixed by a firmware update. v49.0.1 of the
firmware is required. The new firmware requires a kernel patch
Firmware was added via

Search for package or bug name: Reporting problems