Bugzilla – Bug 1150533
AUDIT-1: atop-daemon: review of cron job file(s): /etc/cron.d/atop
Last modified: 2020-01-30 10:00:09 UTC
+++ This bug was initially created as a clone of Bug #1150175 As discussed in the proactive security team we want to restrict the installation of cron job files in the future. To achieve this we first need to cover the currently existing packages that do this. atop-daemon install a cron file in /etc/cron.d/atop. It should be reviewed and subsequently whitelisted if all is well.
I've reviewed the cron job. It calls `systemctl restart atop` which in turn runs /usr/share/atop/atop.daily. This bash script restarts a potentially running atop-daemon. It should be safe. The PIDFILE handling logic might allow to trick it to send a SIGUSR2 to a process owned by an attacker in some situations. But I don't think that's very security relevant.
I have already whitelisted this cron job. Everything should be fine. Therefore closing this bug as FIXED.