Description of problem: This is required because of bug 820396 (rsyslog5). Using our rsyslog sanity tests I was able to identify these AVCs: type=AVC msg=audit(1343394532.740:166946): avc: denied { getsched } for pid=1129 comm="rsyslogd" scontext=root:system_r:syslogd_t:s0 tcontext=root:system_r:syslogd_t:s0 tclass=process type=AVC msg=audit(1343394532.760:166947): avc: denied { sys_nice } for pid=1130 comm="rsyslogd" capability=23 scontext=root:system_r:syslogd_t:s0 tcontext=root:system_r:syslogd_t:s0 tclass=capability type=AVC msg=audit(1343394532.760:166947): avc: denied { setsched } for pid=1130 comm="rsyslogd" scontext=root:system_r:syslogd_t:s0 tcontext=root:system_r:syslogd_t:s0 tclass=process Moreover we need to backport boolean allow syslogd_t smtp_port_t : tcp_socket name_connect ; [ logging_syslogd_can_sendmail ]
Yes, will be in the next build.
Fixed in selinux-policy-2.4.6-330.el5
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHBA-2013-0060.html