A researcher claims that the issue can be exploited by attackers in order to gain root access.
Source: Threadpost