Description
Tmds.DBus provides .NET libraries for working with D-Bus from .NET. Tmds.DBus and Tmds.DBus.Protocol are vulnerable to malicious D-Bus peers. A peer on the same bus can spoof signals by impersonating the owner of a well-known name, exhaust system resources or cause file descriptor spillover by sending messages with an excessive number of Unix file descriptors, and crash the application by sending malformed message bodies that cause unhandled exceptions on the SynchronizationContext. This vulnerability is fixed in Tmds.DBus 0.92.0 and Tmds.DBus.Protocol 0.92.0 and 0.21.3.
INFO
Published Date :
2026-04-09T16:29:20.616Z
Last Modified :
2026-04-09T19:32:09.891Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-39959 vulnerability.
| Vendors | Products |
|---|---|
| Tmds |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-39959.