What | Removed | Added |
---|---|---|
Status | NEW | IN_PROGRESS |
I've reviewed the cron job. It calls `systemctl restart atop` which in turn runs /usr/share/atop/atop.daily. This bash script restarts a potentially running atop-daemon. It should be safe. The PIDFILE handling logic might allow to trick it to send a SIGUSR2 to a process owned by an attacker in some situations. But I don't think that's very security relevant.