A researcher claims that the issue can be exploited by attackers in order to gain root access. Read more