The slapper function in chkrootkit before 0.50 does not properly quote file paths, which allows local users to execute arbitrary code via a Trojan horse executable. NOTE: this is only a vulnerability when /tmp is not mounted with the noexec option.
https://www.exploit-db.com/exploits/38775/
https://security.gentoo.org/glsa/201709-05
http://www.ubuntu.com/usn/USN-2230-1
http://www.debian.org/security/2014/dsa-2945
http://packetstormsecurity.com/files/134484/Chkrootkit-Local-Privilege-Escalation.html