D-Bus Vulnerability in Tmds.DBus and Tmds.DBus.Protocol by Tmds
CVE-2026-39959

7.1HIGH

Key Information:

Vendor

Tmds

Vendor
CVE Published:
9 April 2026

What is CVE-2026-39959?

Tmds.DBus and Tmds.DBus.Protocol are susceptible to attacks whereby malicious D-Bus peers can impersonate legitimate owners of well-known names. This exploitation allows for signal spoofing, which could lead to resource exhaustion and system instability. Attackers can overwhelm the system by sending excessive Unix file descriptors offloading which may culminate in file descriptor spillover and unhandled exceptions, potentially crashing applications. The vulnerability has been addressed in Tmds.DBus version 0.92.0 and Tmds.DBus.Protocol versions 0.92.0 and 0.21.3.

Affected Version(s)

Tmds.DBus < 0.92.0

Tmds.DBus.Protocol < 0.21.3 < 0.21.3

Tmds.DBus.Protocol >= 0.22.0, < 0.92.0 < 0.22.0, 0.92.0

References

CVSS V3.1

Score:
7.1
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.