http://bugzilla.suse.com/show_bug.cgi?id=1150533
http://bugzilla.suse.com/show_bug.cgi?id=1150533#c1
Matthias Gerstner changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |IN_PROGRESS
--- Comment #1 from Matthias Gerstner ---
I've reviewed the cron job. It calls `systemctl restart atop` which in turn
runs /usr/share/atop/atop.daily. This bash script restarts a potentially
running atop-daemon. It should be safe.
The PIDFILE handling logic might allow to trick it to send a SIGUSR2 to a
process owned by an attacker in some situations. But I don't think that's very
security relevant.
--
You are receiving this mail because:
You are on the CC list for the bug.