If the tcsd daemon is started with root privileges, the tss user still has read and write access to the /etc/tcsd.conf file (which contains various settings related to this daemon). External Reference: https://www.openwall.com/lists/oss-security/2020/08/14/1
Created trousers tracking bugs for this issue: Affects: fedora-all [bug 1870057]
Upstream commit for this issue: https://sourceforge.net/p/trousers/trousers/ci/e74dd1d96753b0538192143adf58d04fcd3b242b/
There's an issue on trousers. If trousers daemon is started using root user the default, tss unprivileged user still can write to the configuration file due to missing checks at conf_file_init() function. As tcsd.conf holds a set of sensitive configuration entries for the daemon, an attacker can use that to cause DoS, compromise confidentiality or integrity of several system data.
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:1627 https://access.redhat.com/errata/RHSA-2021:1627
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-24331