$ for f in /etc/at/at.deny /etc/cron.hourly/0anacron
/etc/default/useradd ; do
  ls -l $f ; qfile $f ;
done
-rw-r----- 1 root at 166 Dec 10 16:57 /etc/at/at.deny
sys-process/at (/etc/at/at.deny)
-rwxr-x--- 1 root root 392 Nov  4 21:04 /etc/cron.hourly/0anacron
sys-process/cronie (/etc/cron.hourly/0anacron)
-rw------- 1 root root 96 Aug 14 10:57 /etc/default/useradd
sys-apps/shadow (/etc/default/useradd)

None of these seem sensitive to me, and restricting them like this looks
like a case of SBO.  On a debian system at.deny has similarly restricted
perms; I can't check 0anacron because my debian system has no such
package installed; and default/useradd has normal 644 mode.

-- 
Please don't Cc: me privately on mailing lists and Usenet,
if you also post the followup to the list or newsgroup.
To reply privately _only_ on Usenet, fetch the TXT record for the domain.

Reply via email to