trousers is vulnerable to privilege escalation. The vulnerability exists because the tcsd daemon is started with root privileges instead of by the tss user, it fails to drop the root gid privilege when no longer needed which allows an attacker to gain privilege and perform unwanted actions.
www.openwall.com/lists/oss-security/2020/08/14/1
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/
access.redhat.com/errata/RHSA-2021:1627
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1870054
bugzilla.suse.com/show_bug.cgi?id=1164472
lists.fedoraproject.org/archives/list/[email protected]/message/SSDL7COIFCZQMUBNAASNMKMX7W5JUHRD/
seclists.org/oss-sec/2020/q2/att-135/tcsd_fixes.patch
sourceforge.net/p/trousers/mailman/message/37015817/
www.openwall.com/lists/oss-security/2020/08/14/1