diff --git a/policy-F12.patch b/policy-F12.patch
index 4248d81..4e06a91 100644
--- a/policy-F12.patch
+++ b/policy-F12.patch
@@ -3539,16 +3539,18 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
+miscfiles_read_localization(ptchown_t)
diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/apps/pulseaudio.te serefpolicy-3.6.28/policy/modules/apps/pulseaudio.te
--- nsaserefpolicy/policy/modules/apps/pulseaudio.te 2009-07-23 14:11:04.000000000 -0400
-+++ serefpolicy-3.6.28/policy/modules/apps/pulseaudio.te 2009-08-21 18:56:07.000000000 -0400
-@@ -22,6 +22,7 @@
++++ serefpolicy-3.6.28/policy/modules/apps/pulseaudio.te 2009-08-22 07:48:07.000000000 -0400
+@@ -22,6 +22,9 @@
allow pulseaudio_t self:unix_dgram_socket { sendto create_socket_perms };
allow pulseaudio_t self:tcp_socket create_stream_socket_perms;
allow pulseaudio_t self:udp_socket create_socket_perms;
+allow pulseaudio_t self:netlink_kobject_uevent_socket create_socket_perms;
++
++can_exec(pulseaudio_t, pulseaudio_exec_t)
kernel_read_kernel_sysctls(pulseaudio_t)
-@@ -47,6 +48,7 @@
+@@ -47,6 +50,7 @@
fs_rw_anon_inodefs_files(pulseaudio_t)
fs_getattr_tmpfs(pulseaudio_t)
@@ -3556,15 +3558,23 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
term_use_all_user_ttys(pulseaudio_t)
term_use_all_user_ptys(pulseaudio_t)
-@@ -81,12 +83,15 @@
- ')
-
- optional_policy(`
-+ rpm_dbus_chat(pulseaudio_t)
+@@ -78,6 +82,15 @@
+ policykit_domtrans_auth(pulseaudio_t)
+ policykit_read_lib(pulseaudio_t)
+ policykit_read_reload(pulseaudio_t)
++ policykit_dbus_chat(pulseaudio_t)
+')
+
+optional_policy(`
- udev_read_db(pulseaudio_t)
++ rtkit_daemon_system_domain(pulseaudio_t)
++')
++
++optional_policy(`
++ rpm_dbus_chat(pulseaudio_t)
+ ')
+
+ optional_policy(`
+@@ -85,8 +98,7 @@
')
optional_policy(`
@@ -10536,7 +10546,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
+
diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/cron.te serefpolicy-3.6.28/policy/modules/services/cron.te
--- nsaserefpolicy/policy/modules/services/cron.te 2009-08-14 16:14:31.000000000 -0400
-+++ serefpolicy-3.6.28/policy/modules/services/cron.te 2009-08-21 18:56:07.000000000 -0400
++++ serefpolicy-3.6.28/policy/modules/services/cron.te 2009-08-22 07:19:25.000000000 -0400
@@ -38,6 +38,10 @@
type cron_var_lib_t;
files_type(cron_var_lib_t)
@@ -10811,7 +10821,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
# via redirection of standard out.
optional_policy(`
rpm_manage_log(system_cronjob_t)
-@@ -419,6 +490,10 @@
+@@ -419,6 +490,14 @@
')
optional_policy(`
@@ -10819,10 +10829,14 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
+')
+
+optional_policy(`
++ exim_read_spool_files(system_cronjob_t)
++')
++
++optional_policy(`
ftp_read_log(system_cronjob_t)
')
-@@ -429,11 +504,20 @@
+@@ -429,11 +508,20 @@
')
optional_policy(`
@@ -10843,7 +10857,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
')
optional_policy(`
-@@ -445,9 +529,11 @@
+@@ -445,9 +533,11 @@
')
optional_policy(`
@@ -10857,7 +10871,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
')
optional_policy(`
-@@ -461,8 +547,7 @@
+@@ -461,8 +551,7 @@
')
optional_policy(`
@@ -10867,7 +10881,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
')
optional_policy(`
-@@ -470,24 +555,17 @@
+@@ -470,24 +559,17 @@
')
optional_policy(`
@@ -10895,7 +10909,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
allow cronjob_t self:process { signal_perms setsched };
allow cronjob_t self:fifo_file rw_fifo_file_perms;
allow cronjob_t self:unix_stream_socket create_stream_socket_perms;
-@@ -571,6 +649,9 @@
+@@ -571,6 +653,9 @@
userdom_manage_user_home_content_sockets(cronjob_t)
#userdom_user_home_dir_filetrans_user_home_content(cronjob_t, notdevfile_class_set)
@@ -10905,7 +10919,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
tunable_policy(`fcron_crond', `
allow crond_t user_cron_spool_t:file manage_file_perms;
')
-@@ -590,13 +671,5 @@
+@@ -590,13 +675,5 @@
#
optional_policy(`
@@ -15532,8 +15546,8 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
+/usr/libexec/rtkit-daemon -- gen_context(system_u:object_r:rtkit_daemon_exec_t,s0)
diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/policy/modules/services/rtkit_daemon.if serefpolicy-3.6.28/policy/modules/services/rtkit_daemon.if
--- nsaserefpolicy/policy/modules/services/rtkit_daemon.if 1969-12-31 19:00:00.000000000 -0500
-+++ serefpolicy-3.6.28/policy/modules/services/rtkit_daemon.if 2009-08-21 18:56:07.000000000 -0400
-@@ -0,0 +1,64 @@
++++ serefpolicy-3.6.28/policy/modules/services/rtkit_daemon.if 2009-08-22 07:45:49.000000000 -0400
+@@ -0,0 +1,63 @@
+
+## policy for rtkit_daemon
+
@@ -15580,8 +15594,7 @@ diff -b -B --ignore-all-space --exclude-from=exclude -N -u -r nsaserefpolicy/pol
+
+########################################
+##
-+## Send and receive messages from
-+## rtkit_daemon over dbus.
++## Allow rtkit to control scheduling for your process
+##
+##
+##
diff --git a/selinux-policy.spec b/selinux-policy.spec
index 8bd8787..4c872ce 100644
--- a/selinux-policy.spec
+++ b/selinux-policy.spec
@@ -20,7 +20,7 @@
Summary: SELinux policy configuration
Name: selinux-policy
Version: 3.6.28
-Release: 4%{?dist}
+Release: 5%{?dist}
License: GPLv2+
Group: System Environment/Base
Source: serefpolicy-%{version}.tgz
@@ -475,6 +475,9 @@ exit 0
%endif
%changelog
+* Sat Aug 22 2009 Dan Walsh 3.6.28-5
+- Allow cronjobs to read exim_spool_t
+
* Fri Aug 21 2009 Dan Walsh 3.6.28-4
- Add ABRT policy