Running oddjobd 0.26 on Raw Hide currently causes massive numbers of SELinux policy denials to be logged. The D-BUS maintainer tells me that it's because oddjobd subscribes to all messages using dbus_bus_add_match(""), though it has no need to do so as unicast messages are always routed properly, and this is what's triggering the denials. I need to double-check that removing this call doesn't break anything on FE3/4/5 (which contain older versions of D-BUS which may or may not have required this to be done) before making this fix for the upstream release.
Fixed in oddjob 0.27. There are no ill effects from removing the above add_match call, at least as far back as D-BUS 0.22. The oddjob 0.27 release also fixes a compilation failure against D-Bus 0.90.