DEBIAN-CVE-2025-32735

Source
https://security-tracker.debian.org/tracker/CVE-2025-32735
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-32735.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2025-32735
Upstream
  • CVE-2025-32735
Published
2026-02-10T17:16:17.200Z
Modified
2026-03-17T02:48:03.382165Z
Severity
  • 6.8 (Medium) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X CVSS Calculator
Summary
[none]
Details

Improper conditions check in some firmware for some Intel(R) NPU Drivers within Ring 1: Device Drivers may allow a denial of service. Unprivileged software adversary with an authenticated user combined with a low complexity attack may enable denial of service. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (none), integrity (none) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.

References

Affected packages

Debian:11 / firmware-nonfree

Package

Name
firmware-nonfree
Purl
pkg:deb/debian/firmware-nonfree?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.1
0.2
0.3
0.4
0.4etch1
0.4+etchnhalf.1
0.5
0.6
0.7
0.8
0.9
0.10
0.11
0.12
0.13~bpo40+1
0.13
0.14
0.14+lenny1
0.14+lenny2
0.15
0.16~bpo50+1
0.16
0.17~bpo50+1
0.17
0.18
0.19
0.20
0.21
0.22
0.23~bpo50+1
0.23
0.24~bpo50+1
0.24
0.25
0.26
0.27~bpo50+1
0.27
0.28
0.28+squeeze1
0.29
0.30
0.31
0.32~bpo60+1
0.32
0.33
0.34
0.35~bpo60+1
0.35
0.36
0.36+wheezy.1~bpo60+1
0.36+wheezy.1
0.37
0.38~bpo70+1
0.38
0.39~bpo70+1
0.39
0.40~bpo70+1
0.40
0.41~bpo70+1
0.41
0.42
0.43~bpo70+1
0.43
0.44~bpo8+1
0.44
Other
20151018-1
20151018-2~bpo8+1
20151018-2
20151207-1~bpo8+1
20151207-1
20160110-1~bpo8+1
20160110-1
20160824-1~bpo8+1
20160824-1
20161130-1
20161130-2~bpo8+1
20161130-2
20161130-3~bpo8+1
20161130-3
20161130-4~deb8u1
20161130-4
20161130-5~deb8u1
20161130-5
20170823-1~bpo9+1
20170823-1
20180518-1~bpo9+1
20180518-1
20180825-1
20180825+dfsg-1~bpo9+1
20180825+dfsg-1
20190114-1~bpo9+1
20190114-1~bpo9+2
20190114-1
20190114-2~bpo9+1
20190114-2~deb9u1
20190114-2
20190502-1
20190717-1
20190717-2~bpo10+1
20190717-2
20200421-1
20200619-1~bpo10+1
20200619-1
20200721-1~bpo10+1
20200721-1
20200817-1~bpo10+1
20200817-1
20200918-1~bpo10+1
20200918-1
20201022-1
20201118-1
20201218-1
20201218-2
20201218-3
20210208-1
20210208-2
20210208-3
20210208-4~bpo10+1
20210208-4
20210315-1~exp1
20210315-1
20210315-2~bpo10+1
20210315-2
20210315-3~bpo10+1
20210315-3
20210322-1~exp1
20210427-1
20210511-1~exp1
20210511-1
20210716-1~exp1
20210818-1~bpo11+1
20210818-1
20220913-1
20221012-1
20221109-1
20221109-2
20221109-3
20221109-4
20221214-1
20221214-2
20221214-3
20221214-5
20230117-1
20230117-2
20230210-1
20230210-2
20230210-3
20230210-4~bpo11+1
20230210-4
20230210-5~bpo11+1
20230210-5
20230310-1~exp1
20230310-1~exp2
20230404-1
20230515-1
20230515-2
20230515-3
20230515-4
20230625-1
20230625-2
20230625-3~exp2
20230625-3~exp3
20240610-1
20240709-1
20240709-2~bpo12+1
20240709-2
20240811-1
20240909-1
20240909-2
20241210-1~bpo12+1
20241210-1
20250109-1
20250211-1
20250311-1
20250410-1
20250410-2~bpo12+1
20250410-2
20250509-1
20250613-1
20250627-1
20250708-1
20250808-1~bpo13+1
20250808-1
20250917-1
20251011-1
20251021-1~bpo13+1
20251021-1
20251111-1~bpo13+1
20251111-1
20251125-1
20260110-1~bpo13+1
20260110-1
20260221-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-32735.json"

Debian:13 / firmware-nonfree

Package

Name
firmware-nonfree
Purl
pkg:deb/debian/firmware-nonfree?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.1
0.2
0.3
0.4
0.4etch1
0.4+etchnhalf.1
0.5
0.6
0.7
0.8
0.9
0.10
0.11
0.12
0.13~bpo40+1
0.13
0.14
0.14+lenny1
0.14+lenny2
0.15
0.16~bpo50+1
0.16
0.17~bpo50+1
0.17
0.18
0.19
0.20
0.21
0.22
0.23~bpo50+1
0.23
0.24~bpo50+1
0.24
0.25
0.26
0.27~bpo50+1
0.27
0.28
0.28+squeeze1
0.29
0.30
0.31
0.32~bpo60+1
0.32
0.33
0.34
0.35~bpo60+1
0.35
0.36
0.36+wheezy.1~bpo60+1
0.36+wheezy.1
0.37
0.38~bpo70+1
0.38
0.39~bpo70+1
0.39
0.40~bpo70+1
0.40
0.41~bpo70+1
0.41
0.42
0.43~bpo70+1
0.43
0.44~bpo8+1
0.44
Other
20151018-1
20151018-2~bpo8+1
20151018-2
20151207-1~bpo8+1
20151207-1
20160110-1~bpo8+1
20160110-1
20160824-1~bpo8+1
20160824-1
20161130-1
20161130-2~bpo8+1
20161130-2
20161130-3~bpo8+1
20161130-3
20161130-4~deb8u1
20161130-4
20161130-5~deb8u1
20161130-5
20170823-1~bpo9+1
20170823-1
20180518-1~bpo9+1
20180518-1
20180825-1
20180825+dfsg-1~bpo9+1
20180825+dfsg-1
20190114-1~bpo9+1
20190114-1~bpo9+2
20190114-1
20190114-2~bpo9+1
20190114-2~deb9u1
20190114-2
20190502-1
20190717-1
20190717-2~bpo10+1
20190717-2
20200421-1
20200619-1~bpo10+1
20200619-1
20200721-1~bpo10+1
20200721-1
20200817-1~bpo10+1
20200817-1
20200918-1~bpo10+1
20200918-1
20201022-1
20201118-1
20201218-1
20201218-2
20201218-3
20210208-1
20210208-2
20210208-3
20210208-4~bpo10+1
20210208-4
20210315-1~exp1
20210315-1
20210315-2~bpo10+1
20210315-2
20210315-3~bpo10+1
20210315-3
20210322-1~exp1
20210427-1
20210511-1~exp1
20210511-1
20210716-1~exp1
20210818-1~bpo11+1
20210818-1
20220913-1
20221012-1
20221109-1
20221109-2
20221109-3
20221109-4
20221214-1
20221214-2
20221214-3
20221214-5
20230117-1
20230117-2
20230210-1
20230210-2
20230210-3
20230210-4~bpo11+1
20230210-4
20230210-5~bpo11+1
20230210-5
20230310-1~exp1
20230310-1~exp2
20230404-1
20230515-1
20230515-2
20230515-3
20230515-4
20230625-1
20230625-2
20230625-3~exp2
20230625-3~exp3
20240610-1
20240709-1
20240709-2~bpo12+1
20240709-2
20240811-1
20240909-1
20240909-2
20241210-1~bpo12+1
20241210-1
20250109-1
20250211-1
20250311-1
20250410-1
20250410-2~bpo12+1
20250410-2
20250509-1
20250613-1
20250627-1
20250708-1
20250808-1~bpo13+1
20250808-1
20250917-1
20251011-1
20251021-1~bpo13+1
20251021-1
20251111-1~bpo13+1
20251111-1
20251125-1
20260110-1~bpo13+1
20260110-1
20260221-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-32735.json"

Debian:14 / firmware-nonfree

Package

Name
firmware-nonfree
Purl
pkg:deb/debian/firmware-nonfree?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
20251011-1

Affected versions

0.*
0.1
0.2
0.3
0.4
0.4etch1
0.4+etchnhalf.1
0.5
0.6
0.7
0.8
0.9
0.10
0.11
0.12
0.13~bpo40+1
0.13
0.14
0.14+lenny1
0.14+lenny2
0.15
0.16~bpo50+1
0.16
0.17~bpo50+1
0.17
0.18
0.19
0.20
0.21
0.22
0.23~bpo50+1
0.23
0.24~bpo50+1
0.24
0.25
0.26
0.27~bpo50+1
0.27
0.28
0.28+squeeze1
0.29
0.30
0.31
0.32~bpo60+1
0.32
0.33
0.34
0.35~bpo60+1
0.35
0.36
0.36+wheezy.1~bpo60+1
0.36+wheezy.1
0.37
0.38~bpo70+1
0.38
0.39~bpo70+1
0.39
0.40~bpo70+1
0.40
0.41~bpo70+1
0.41
0.42
0.43~bpo70+1
0.43
0.44~bpo8+1
0.44
Other
20151018-1
20151018-2~bpo8+1
20151018-2
20151207-1~bpo8+1
20151207-1
20160110-1~bpo8+1
20160110-1
20160824-1~bpo8+1
20160824-1
20161130-1
20161130-2~bpo8+1
20161130-2
20161130-3~bpo8+1
20161130-3
20161130-4~deb8u1
20161130-4
20161130-5~deb8u1
20161130-5
20170823-1~bpo9+1
20170823-1
20180518-1~bpo9+1
20180518-1
20180825-1
20180825+dfsg-1~bpo9+1
20180825+dfsg-1
20190114-1~bpo9+1
20190114-1~bpo9+2
20190114-1
20190114-2~bpo9+1
20190114-2~deb9u1
20190114-2
20190502-1
20190717-1
20190717-2~bpo10+1
20190717-2
20200421-1
20200619-1~bpo10+1
20200619-1
20200721-1~bpo10+1
20200721-1
20200817-1~bpo10+1
20200817-1
20200918-1~bpo10+1
20200918-1
20201022-1
20201118-1
20201218-1
20201218-2
20201218-3
20210208-1
20210208-2
20210208-3
20210208-4~bpo10+1
20210208-4
20210315-1~exp1
20210315-1
20210315-2~bpo10+1
20210315-2
20210315-3~bpo10+1
20210315-3
20210322-1~exp1
20210427-1
20210511-1~exp1
20210511-1
20210716-1~exp1
20210818-1~bpo11+1
20210818-1
20220913-1
20221012-1
20221109-1
20221109-2
20221109-3
20221109-4
20221214-1
20221214-2
20221214-3
20221214-5
20230117-1
20230117-2
20230210-1
20230210-2
20230210-3
20230210-4~bpo11+1
20230210-4
20230210-5~bpo11+1
20230210-5
20230310-1~exp1
20230310-1~exp2
20230404-1
20230515-1
20230515-2
20230515-3
20230515-4
20230625-1
20230625-2
20230625-3~exp2
20230625-3~exp3
20240610-1
20240709-1
20240709-2~bpo12+1
20240709-2
20240811-1
20240909-1
20240909-2
20241210-1~bpo12+1
20241210-1
20250109-1
20250211-1
20250311-1
20250410-1
20250410-2~bpo12+1
20250410-2
20250509-1
20250613-1
20250627-1
20250708-1
20250808-1~bpo13+1
20250808-1
20250917-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-32735.json"