Bugzilla – Bug 1150533
AUDIT-1: atop-daemon: review of cron job file(s): /etc/cron.d/atop
Last modified: 2020-01-30 10:00:09 UTC
+++ This bug was initially created as a clone of Bug #1150175
As discussed in the proactive security team we want to restrict the
installation of cron job files in the future. To achieve this we first need to
cover the currently existing packages that do this.
atop-daemon install a cron file in /etc/cron.d/atop. It should be reviewed and
subsequently whitelisted if all is well.
I've reviewed the cron job. It calls `systemctl restart atop` which in turn
runs /usr/share/atop/atop.daily. This bash script restarts a potentially
running atop-daemon. It should be safe.
The PIDFILE handling logic might allow to trick it to send a SIGUSR2 to a
process owned by an attacker in some situations. But I don't think that's very
I have already whitelisted this cron job. Everything should be fine. Therefore
closing this bug as FIXED.