Pardus Linux Flaw Lets Local Users Gain Silent Root Access
A vulnerability chain in Pardus Linux can let a local user gain root access without an administrator password. The issue affects the pardus-update component, which handles system update tasks in the Debian-based distribution maintained by TÜBİTAK.
The tracked vulnerability is CVE-2026-5140. The official CVE record describes it as a CRLF injection authentication bypass in Pardus Update, while the public technical analysis shows how that flaw can combine with permissive Polkit rules and unsafe APT source handling to reach full root privileges.
Access content across the globe at the highest speed rate.
70% of our readers choose Private Internet Access
70% of our readers choose ExpressVPN
Browse the web from multiple devices with industry-standard security protocols.
Faster dedicated servers for specific actions (currently at summer discounts)
This matters most on shared systems, school labs, government workstations, and enterprise Linux environments where more than one user can log in. A local attacker does not need to exploit the Linux kernel or trick an administrator into entering a password.
What is the Pardus privilege escalation flaw?
The issue sits in the Pardus update workflow. The update tool uses privileged Python helper scripts and Polkit rules to perform system-level package operations.
Security researcher Çağrı Eser, also known as 0xc4gr1, reported that three weaknesses can be chained together. The chain includes a permissive Polkit policy, a CRLF injection issue in configuration writing, and unsafe handling of user-controlled APT source paths.
When combined, these issues can let an unprivileged local user influence update configuration and trigger package installation as root.
Pardus flaw at a glance
| Detail | Information |
|---|---|
| CVE | CVE-2026-5140 |
| Affected component | Pardus Update |
| Official affected version range | Pardus Update 0.6.3 before 0.6.4 |
| Official weakness type | CRLF injection, CWE-93 |
| Official CVSS v3.1 score | 8.8 High |
| Researcher-rated exploit chain | 9.3 Critical |
| Impact shown in research | Local privilege escalation to root |
How the attack chain works
The first weakness involves Polkit. In the vulnerable update policy, sensitive update actions can run without asking the user for administrator authentication.
That means a local user can invoke privileged update helper scripts through pkexec. The problem becomes more serious when those scripts accept unsafe input.
The second weakness appears in SystemSettingsWrite.py. The script writes user-controlled values into the Pardus update configuration file. It blocks normal newline characters, but the researcher found that carriage return characters can still inject new configuration entries.
CRLF injection changes the update configuration
CRLF injection can sound like a web problem, but it can also affect local configuration files. In this case, a carriage return can create an extra setting inside the update configuration.
That injected setting can point the update tool to an attacker-controlled APT source file. Once the configuration changes, the attacker can influence what source list the update process uses.
The third weakness happens when AutoAptUpgrade.py processes that manipulated setting. The script can copy an attacker-supplied APT source file into the system’s sources list directory without properly restricting the path to trusted locations.
Why this can lead to root access
APT operations run with high privileges because package installation changes system files. If an attacker can make the update process trust a malicious local repository, the attacker can push a crafted package into a privileged installation path.
The researcher’s proof of concept used a malicious Debian package to change permissions on a shell binary and then open a root shell. The same root-level access could allow an attacker to read sensitive files, install persistence, alter binaries, or disable security controls.
The attack does not require a race condition or kernel memory corruption. It works because several trust and validation mistakes align in the update chain.
Why shared Pardus systems face the highest risk
This is a local privilege escalation issue in practical terms. The attacker needs a way to run commands as a local user on the system first.
That makes the flaw especially relevant for systems with multiple local users. Examples include labs, shared office workstations, classrooms, public-sector deployments, and enterprise environments where lower-privileged user accounts exist.
An attacker who already has a foothold through stolen credentials, a low-privilege account, or another application flaw could use this chain to gain full control of the machine.
Main weaknesses in the chain
| Weakness | Where it appears | Security impact |
|---|---|---|
| Permissive Polkit policy | pardus-update policy actions | Allows privileged scripts to run without administrator authentication |
| CRLF injection | SystemSettingsWrite.py | Allows extra configuration entries to be inserted |
| Unsafe source path handling | AutoAptUpgrade.py | Allows attacker-controlled APT source files to enter the update process |
| Trusted package installation | APT update workflow | Lets a malicious package run privileged installation logic |
What attackers could do after exploitation
- Gain root-level shell access.
- Read sensitive files such as password hashes and system configuration data.
- Create persistent backdoors.
- Modify trusted binaries or scripts.
- Add malicious packages or repositories.
- Disable security tools or logging.
- Use the host as a stepping stone inside a larger network.
Any successful exploitation should be treated as full system compromise. Root access gives the attacker control over nearly every part of the machine.
How administrators should respond
Administrators should update Pardus Update to a fixed version as soon as patches are available through official channels. The official CVE record lists Pardus Update versions from 0.6.3 before 0.6.4 as affected.
Security teams should also review whether any local users have access to vulnerable Pardus systems. Systems with multiple untrusted users should receive priority because they provide the clearest path for local exploitation.
If immediate patching is not possible, administrators should harden the update workflow by requiring administrator authentication for sensitive Polkit actions, blocking unsafe CRLF input, and restricting APT source paths to trusted directories.
Recommended mitigation checklist
- Update Pardus Update to the fixed release provided by official repositories.
- Review Polkit rules for pardus-update and require administrator authentication for privileged actions.
- Sanitize carriage return and newline characters in update configuration inputs.
- Restrict APT source files to trusted system directories.
- Block world-writable paths from being used as package source locations.
- Audit recent changes to /etc/pardus/pardus-update.conf.
- Review /etc/apt/sources.list.d/ for unexpected repository files.
- Check SUID permissions on sensitive binaries after suspected exploitation.
What to monitor for signs of abuse
Security teams should look for unusual pkexec use involving Pardus update scripts. They should also review update logs, APT source changes, and unexpected package installations.
Changes to shell binary permissions can be a serious warning sign. Administrators should investigate if /bin/bash or other sensitive binaries unexpectedly gain the SUID bit.
Teams should also check whether new APT source files point to temporary, user-writable, or unknown locations. That pattern can indicate an attempt to push a malicious package through the update system.
Why the flaw is a design lesson
The Pardus issue shows how small security mistakes can combine into a major compromise. A permissive authorization rule may look like a usability choice. A carriage return handling bug may look minor. A loose file path rule may look harmless on its own.
Together, those issues can create a direct path from a normal user account to root. Update tools need especially strict controls because they already run close to the most trusted parts of the operating system.
The safest design is to require authentication for privileged actions, reject unsafe configuration input, and never trust user-controlled paths during package management operations.
FAQ
CVE-2026-5140 is a CRLF injection authentication bypass issue affecting Pardus Update. Public research shows that it can be chained with Polkit and APT source handling weaknesses to gain local root access.
The official CVE record says Pardus Update versions from 0.6.3 before 0.6.4 are affected. Administrators should check their installed package version and apply official updates.
The public root-access chain requires local command execution. It becomes most dangerous when an attacker already has a low-privilege account or another foothold on a vulnerable Pardus system.
Polkit controls whether users can run privileged actions. In the vulnerable chain, permissive Polkit rules allow sensitive Pardus update helper scripts to run without administrator authentication.
Administrators should install official updates, require administrator authentication for Pardus update Polkit actions, sanitize CRLF characters in configuration inputs, and restrict APT source paths to trusted directories.
Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more
User forum
0 messages