allow user_crond_t apmd_log_t:file getattr;
allow user_crond_t cupsd_log_t:dir read;
allow user_crond_t devlog_t:sock_file write;
allow user_crond_t httpd_log_t:dir read;
allow user_crond_t logwatch_cache_t:dir read;
allow user_crond_t man_t:dir { getattr read search };
allow user_crond_t print_spool_t:dir search;
allow user_crond_t rpm_log_t:file { getattr write };
allow user_crond_t sendmail_exec_t:file entrypoint;
allow user_crond_t tmp_t:dir { read write };
allow user_crond_t var_lib_t:dir { getattr search };
allow user_crond_t var_lock_t:dir search;
allow user_crond_t var_log_t:dir read;
allow user_crond_t var_log_t:file getattr;

These should be running in system_crond_t? This is logwatch creating most of these. Do
you think the latest patch is causing this?

--
redhat-lspp mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/redhat-lspp

Reply via email to