2017-07-25 18:00:00
redhat
PUBLISHED
rsyslog uses weak permissions for generating log files, which allows local users to obtain sensitive information by reading files in /var/log/cron.