Tmds.DBus: malicious D-Bus peers can spoof signals, exhaust file descriptor resources, and cause denial of service
Description
Published to the GitHub Advisory Database
Apr 8, 2026
Reviewed
Apr 8, 2026
Published by the National Vulnerability Database
Apr 9, 2026
Last updated
Apr 9, 2026
Tmds.DBus and Tmds.DBus.Protocol are vulnerable to malicious D-Bus peers. A peer on the same bus can spoof signals by impersonating the owner of a well-known name, exhaust system resources or cause file descriptor spillover by sending messages with an excessive number of Unix file descriptors, and crash the application by sending malformed message bodies that cause unhandled exceptions on the SynchronizationContext.
Patches
The vulnerabilities are fixed in version 0.92.0.
For Tmds.DBus.Protocol, the fixes are also backported to 0.21.3.
Workarounds
There are no known workarounds. Users should upgrade to a patched version.
References