$ for f in /etc/at/at.deny /etc/cron.hourly/0anacron /etc/default/useradd ; do ls -l $f ; qfile $f ; done -rw-r----- 1 root at 166 Dec 10 16:57 /etc/at/at.deny sys-process/at (/etc/at/at.deny) -rwxr-x--- 1 root root 392 Nov 4 21:04 /etc/cron.hourly/0anacron sys-process/cronie (/etc/cron.hourly/0anacron) -rw------- 1 root root 96 Aug 14 10:57 /etc/default/useradd sys-apps/shadow (/etc/default/useradd)
None of these seem sensitive to me, and restricting them like this looks like a case of SBO. On a debian system at.deny has similarly restricted perms; I can't check 0anacron because my debian system has no such package installed; and default/useradd has normal 644 mode. -- Please don't Cc: me privately on mailing lists and Usenet, if you also post the followup to the list or newsgroup. To reply privately _only_ on Usenet, fetch the TXT record for the domain.