Tmds.DBus and Tmds.DBus.Protocol are vulnerable to malicious D-Bus peers. A peer on the same bus can spoof signals by impersonating the owner of a well-known name, exhaust system resources or cause file descriptor spillover by sending messages with an excessive number of Unix file descriptors, and crash the application by sending malformed message bodies that cause unhandled exceptions on the SynchronizationContext.
The vulnerabilities are fixed in version 0.92.0. For Tmds.DBus.Protocol, the fixes are also backported to 0.21.3.
There are no known workarounds. Users should upgrade to a patched version.
{
"nvd_published_at": "2026-04-09T17:16:30Z",
"severity": "HIGH",
"github_reviewed": true,
"cwe_ids": [
"CWE-290",
"CWE-400"
],
"github_reviewed_at": "2026-04-08T19:52:58Z"
}