Created attachment 649380 [details] output of ausearch -m AVC -ts today Description of problem: #============= httpd_suexec_t ============== allow httpd_suexec_t httpd_tmp_t:file { read write }; #============= httpd_sys_script_t ============== allow httpd_sys_script_t devlog_t:sock_file write; allow httpd_sys_script_t syslogd_t:unix_dgram_socket sendto; see attached output of ausearch -m AVC -ts today Version-Release number of selected component (if applicable): dspam-3.10.2-2.el6.i686 selinux-policy-targeted-3.7.19-181.el6.noarch
Did it work with #============= httpd_sys_script_t ============== allow httpd_sys_script_t devlog_t:sock_file write; allow httpd_sys_script_t syslogd_t:unix_dgram_socket sendto; or did you also need to have #============= httpd_suexec_t ============== allow httpd_suexec_t httpd_tmp_t:file { read write };
I am sorry, I have given up on dspam a long time ago (it is just too bloody complicated comparing to the plain bogofilter). You can close this as INSUFFICIENT_DATA.
This package has changed maintainer in the Fedora. Reassigning to the new maintainer of this component.
This message is a reminder that EPEL 6 is nearing its end of life. Fedora will stop maintaining and issuing updates for EPEL 6 on 2020-11-30. It is our policy to close all bug reports from releases that are no longer maintained. At that time this bug will be closed as EOL if it remains open with a 'version' of 'el6'. Package Maintainer: If you wish for this bug to remain open because you plan to fix it in a currently maintained version, simply change the 'version' to a later EPEL version. Thank you for reporting this issue and we are sorry that we were not able to fix it before EPEL 6 is end of life. If you would still like to see this bug fixed and are able to reproduce it against a later version of Fedora, you are encouraged change the 'version' to a later Fedora version prior this bug is closed as described in the policy above.
EPEL el6 changed to end-of-life (EOL) status on 2020-11-30. EPEL el6 is no longer maintained, which means that it will not receive any further security or bug fix updates. As a result we are closing this bug. If you can reproduce this bug against a currently maintained version of EPEL please feel free to reopen this bug against that version. If you are unable to reopen this bug, please file a new report against the current release. If you experience problems, please add a comment to this bug. Thank you for reporting this bug and we are sorry it could not be fixed.