Description

Tmds.DBus provides .NET libraries for working with D-Bus from .NET. Tmds.DBus and Tmds.DBus.Protocol are vulnerable to malicious D-Bus peers. A peer on the same bus can spoof signals by impersonating the owner of a well-known name, exhaust system resources or cause file descriptor spillover by sending messages with an excessive number of Unix file descriptors, and crash the application by sending malformed message bodies that cause unhandled exceptions on the SynchronizationContext. This vulnerability is fixed in Tmds.DBus 0.92.0 and Tmds.DBus.Protocol 0.92.0 and 0.21.3.

INFO

Published Date :

2026-04-09T16:29:20.616Z

Last Modified :

2026-04-09T19:32:09.891Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-39959 vulnerability.

Vendors Products
Tmds
  • Tmds.dbus
  • Tmds.dbus.protocol
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-39959.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact