{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreihzadu3t7mjoxfwymc5wojz2jpsyi6r6re2dycnsf5hv3rlgie6qe",
"uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3mmf44iqm6te2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreigbrmvy6xgvjrehofilocn6bqrjcis65zgauklnyblxix7km4uj7i"
},
"mimeType": "image/webp",
"size": 23432
},
"path": "/pardus-linux-flaw-lets-local-users-gain-silent-root-access/",
"publishedAt": "2026-05-21T18:48:26.000Z",
"site": "https://vpncentral.com",
"tags": [
"News",
"Pardus Linux Flaw Lets Local Users Gain Silent Root Access",
"VPN Central"
],
"textContent": "A vulnerability chain in Pardus Linux can let a local user gain root access without an administrator password. The issue affects the pardus-update component, which handles system update tasks in the Debian-based distribution maintained by TÜBİTAK. The tracked vulnerability is CVE-2026-5140. The official CVE record describes it as a CRLF injection authentication bypass in Pardus […]\n\nThe post Pardus Linux Flaw Lets Local Users Gain Silent Root Access appeared first on VPN Central.",
"title": "Pardus Linux Flaw Lets Local Users Gain Silent Root Access"
}