GHSA-XRW6-GWF8-VVR9: Signal Spoofing and Resource Exhaustion in Tmds.DBus
Vulnerability ID: GHSA-XRW6-GWF8-VVR9
CVSS Score: 7.1
Published: 2026-04-08
The GHSA-XRW6-GWF8-VVR9 vulnerability identifies multiple high-severity flaws in the Tmds.DBus and Tmds.DBus.Protocol .NET libraries. These components fail to properly authenticate the sender of D-Bus signals and mishandle file descriptor lifecycle operations during message parsing. A local unprivileged attacker connected to the D-Bus system or session bus can exploit these issues to execute denial-of-service attacks or manipulate application logic via spoofed signals.
TL;DR
Tmds.DBus and Tmds.DBus.Protocol are vulnerable to D-Bus signal spoofing and file descriptor exhaustion. Attackers with local D-Bus access can forge signals or crash applications by exhausting file handles. The maintainers have fixed these issues in versions 0.21.3 and 0.92.0.
Technical Details
- Primary CWE IDs: CWE-345, CWE-400, CWE-20
- Attack Vector: Local / Adjacent (D-Bus)
- CVSS Score: 7.1 (High)
- Impact: Denial of Service, Integrity Compromise
- Exploit Maturity: None (No public PoC)
- CISA KEV Status: Not Listed
Affected Systems
- .NET applications implementing D-Bus clients
- .NET applications implementing D-Bus servers
- Systems relying on Tmds.DBus for Inter-Process Communication (IPC)
-
Tmds.DBus: < 0.21.3 (Fixed in:
0.21.3) -
Tmds.DBus.Protocol: < 0.92.0 (Fixed in:
0.92.0)
Mitigation Strategies
- Upgrade Tmds.DBus library to a fixed version.
- Monitor system logs for "Too many open files" errors indicative of resource exhaustion.
- Audit local D-Bus traffic for suspicious signal emissions and unverified senders.
Remediation Steps:
- Identify all .NET projects utilizing Tmds.DBus or Tmds.DBus.Protocol.
- Update the project dependencies in the .csproj files.
- Target version 0.21.3 or greater for Tmds.DBus.
- Target version 0.92.0 or greater for Tmds.DBus.Protocol.
- Recompile and redeploy the affected applications.
- Restart the affected services to clear any currently leaked file descriptors.
References
Read the full report for GHSA-XRW6-GWF8-VVR9 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)