{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreihzadu3t7mjoxfwymc5wojz2jpsyi6r6re2dycnsf5hv3rlgie6qe",
    "uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3mmf44iqm6te2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreigbrmvy6xgvjrehofilocn6bqrjcis65zgauklnyblxix7km4uj7i"
    },
    "mimeType": "image/webp",
    "size": 23432
  },
  "path": "/pardus-linux-flaw-lets-local-users-gain-silent-root-access/",
  "publishedAt": "2026-05-21T18:48:26.000Z",
  "site": "https://vpncentral.com",
  "tags": [
    "News",
    "Pardus Linux Flaw Lets Local Users Gain Silent Root Access",
    "VPN Central"
  ],
  "textContent": "A vulnerability chain in Pardus Linux can let a local user gain root access without an administrator password. The issue affects the pardus-update component, which handles system update tasks in the Debian-based distribution maintained by TÜBİTAK. The tracked vulnerability is CVE-2026-5140. The official CVE record describes it as a CRLF injection authentication bypass in Pardus […]\n\nThe post Pardus Linux Flaw Lets Local Users Gain Silent Root Access appeared first on VPN Central.",
  "title": "Pardus Linux Flaw Lets Local Users Gain Silent Root Access"
}