DescriptionNull pointer reference in some Intel(R) Graphics Drivers for Windows* before version and before version Linux kernel version 5.5 may allow a privileged user to potentially enable a denial of service via local access.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitylow

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
firmware-nonfree (PTS)stretch/non-free20161130-5vulnerable
stretch/non-free (security)20190114-2~deb9u1vulnerable
bullseye/non-free, sid/non-free20210315-2fixed
linux (PTS)stretch4.9.228-1vulnerable
stretch (security)4.9.272-2vulnerable
buster (security)4.19.194-3vulnerable
bullseye, sid5.10.46-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


[buster] - firmware-nonfree <no-dsa> (Non-free not supported)
[stretch] - firmware-nonfree <ignored> (Minor issue, too intrusive to fix since kernel patch is needed)
Short of details:
Per Intel, this was fixed by a firmware update. v49.0.1 of the
firmware is required. The new firmware requires a kernel patch
Firmware was added via

Search for package or bug name: Reporting problems