b1  < \pd0pP <p l |HV Public KeysiDevelopment/SystemApplications/MultimediaH.TSystem Environment/Daemons0-RSApplications/Internet ZNOQApplications/Editors>I^s}&'tApplications/System=Applications/Publishing8268AvApplications/File0`t;<MehxDevelopment/Languages/]Applications/DatabasesH-N\m{|*\]^_`abopqrsvw Unspecified+Applications/Archiving8$.SaDevelopment/Tools8"1PApplications/Text0!<CQX_cju~"%3456789:=>?@ABCDEFGHIJKLWgklmuy{}Development/LibrariesSystem Environment/Shells     System Environment/Kernel FJLT[fpqryz $(,/02UZ[cd~System Environment/Basep  #%&'()*3459:;?@BDEGHKMORUVWYbdeghiklnwx!+PXYfjnz| Development/LiSystem Environment/D Unspecifiedn , x0d H ,   (  | d P 8 ,   x d x   \  x d h D ( @@^` K Applications/EngineeringxeDGL-.<>Bq!6>F[\"e|  5 B C L h i k l FL09n^   $&')*35678=AEHIJMQSTVWXY[p eDGLq6F["L l u &&k&n&o&p&q&r&s&t&v&w&x&y&z&{&}&~&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&@h @( @( @( @( @( @( @( @( @P @P @ @ @t @t @t 8Development/Languages EDevelopment/Debuggers/mDaemons 7888CSSPc5e v%U9RdApplications/Text>VL% \ w RfhxlApplications/System=Applications/Publishing 8Applications/Networking6 nApplications/Multimediar 7*8R0V`hhjjk[llm1mnnApplications/Internet`A& %( *78l_-mmApplications/FileK Applications/Engineering(TTTUApplications/Editors`7)G*G+G,G-G.G]DhhlApplications/Databases@0mApplications/Database RRApplications/Archiving  th t \@8,hutdown - Fix description for files_dontaudit_read_security_files() interface- Add new policy and man page for bcfg2 - cgconfig needs to use getpw calls - Allow domains that communicate with the keyring to use cache_home_t instead of gkeyringd_tmpt - gnome-keyring wants to create a directory in cache_home_t - sanlock calls getpw- Add numad policy and numad man page - Add fixes for interface bugs discovered by SEWatch - Add /tmp support for squid - Add fix for #799102 * change default labeling for /var/run/slapd.* sockets - Make thumb_t as userdom_home_reader - label /var/lib/sss/mc same as pubconf, so getpw domains can read it - Allow smbspool running as cups_t to stream connect to nmbd - accounts needs to be able to execute passwd on behalf of users - Allow systemd_tmpfiles_t to delete boot flags - Allow dnssec_trigger to connect to apache ports - Allow gnome keyring to create sock_files in ~/.cache - google_authenticator is using .google_authenticator - sandbox running from within firefox is exposing more leaks - Dontaudit thumb to read/write /dev/card0 - Dontaudit getattr on init_exec_t for gnomeclock_t - Allow certmonger to do a transition to certmonger_unconfined_t - Allow dhcpc setsched which is caused by nmcli - Add rpm_exec_t for /usr/sbin/bcfg2 - system cronjobs are sending dbus messages to systemd_logind - Thumnailers read /dev/urand- Allow auditctl getcap - Allow vdagent to use libsystemd-login - Allow abrt-dump-oops to search /etc/abrt - Got these avc's while trying to print a boarding pass from firefox - Devicekit is now putting the media directory under /run/media - Allow thumbnailers to create content in ~/.thumbails directory - Add support for proL2TPd by Dominick Grift - Allow all domains to call getcap - wdmd seems to get a random chown capability check that it does not need - Allow vhostmd to read kernel sysctls- Allow chronyd to read unix - Allow hpfax to read /etc/passwd - Add support matahari vios-proxy-* apps and add virtd_exec_t label for them - Allow rpcd to read quota_db_t - Update to man pages to match latest policy - Fix bug in jockey interface for sepolgen-ifgen - Add initial svirt_prot_exec_t policy- More fixes for systemd from Dan Walsh- Add a new type for /etc/firewalld and allow firewalld to write to this directory - Add definition for ~/Maildir, and allow mail deliver domains to write there - Allow polipo to run from a cron job - Allow rtkit to schedule wine processes - Allow mozilla_plugin_t to acUser Interface/X-@h@h@h@hmmmm@@@@@@@@@mpr (KMNRSUWcuxyz{|}~!+,>@h 6 I y z 89:Ttuvwx%.077.88@@@@ADMEMMRRRRRR/VXZ~]yaza{a|a}a~aaabii}llm7778@@AAAAAA A A AAAAIVR2mcPanel Angular applications,dnpluginb8Web/LogAnalysish8!8mcPanellwUser Interface/X- cpanel/perl Unspecified  |`d D (  |<0$t`D0 | l ` H < ,   pdTH8,| x l P H $   p d X L < 0 $  x`T<0 pd t TH4(l X P , $    x T H  th\T0(  | l ` X L @ 4 (  | h T @ 4 $   se remove handler as shutdO menu_es.utf-8.vimO menu_es.latin1.vim suOemenu_eo_xx.utf-8.vim0O menu_eo_eo.utf-8.vimiOHmenu_eo.utf-8.vimOs%menu_english_united_kingdom.ascii.vimOW$menu_english_united_kingdom.1252.vim8O menu_en_gb.utf-8.vimyOdmenu_en_gb.latin1.vimOkmenu_de_de.utf-8.vim Oumenu_de_de.latin1.vimOpmenu_de.utf-8.vimO-menu_de.latin1.vimaseO t#menu_czech_czech_republic.ascii.vimecO 3"menu_czech_czech_republic.1252.vimptiO o"menu_czech_czech_republic.1250.vim[s3O :menu_0 keyring.pyom( keyring.pyc.9O keyring.pynu_ akibana_plugin.pyo kibana_plugin.pyc Okibana_plugin.pyu;Okinesis_stream.pyotin:Okinesis_stream.pyc.ut9Okinesis_stream.py5Gmknown_hosts.pyou_4Fmknown_hosts.pycu_3Eiknown_hosts.pym;g keywrap.rstod keywrap.pyo(i keywrap.pyce_ keywrap.py. kn_IN.datkn.dat[_ km_KH.datkm.datgar kl_GL.datbkl.dat kk_KZ.datekk_Cyrl_KZ.datl.v kk_Cyrl.datmkk.datm kfo_CI.datkfo.datA4keys.pyopdkeys.pyc"wkeys.py!kn_INMeekn.pl 5knlib kmscon.ppkmsi kmod.8.gzlkmod-static-nodes.service rkmod-20 ekmod@+17=CIOkSystem/Utilities"lSystem/Libraries7 System/Tools %45:@BDEGHOUegikwxPfjz  #$);@&@&@&@t@t@t@t@t@t@t@t@t@t@t@t@t@t@t@t@t@t@t@t@@%8kSystem/Utilities 7,8]ilSystem/Libraries7 System/Tools System Environment/ShellsSystem Environment/Librariess@Addddddddddddddddd^lmmnSystem Environment/Kernel`-.C({)7@R~TZ]]i_hikkXl.mmmmmmmmmmmmmmmmmmmmmmmSystem Environment/Daemonsb7c7d7e7f7g7h7i7j7k7l7m7n7o7p7q7r7s7t7u7v7w7x7y7z7{7|7}7~777777777777777777777777777777777777777777777777777777777777777777777777@KKKBMSRTRUo_dhhii4m5555555555555555555555555555555555555555555666666666 6 6 6 6 666666666666666666 6!6"6#6$6%6&6'6(6)6*6+6,6-6.6/606162636465666768696:6;6<6=6>6?6@6A6B6C6D6E6F6G6H6I6J6K6L6M6N6O6P6Q6R6S6T6U6V6W6X6Y6Z6[6\6]6^6_6`6a6b6c6d6e6f6g6h6i6j6k6l6m6n6o6p6q6r6s6t6u6v6w6x6y6z6{6|6}6~66666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666777777777 7 7 7 7 7777777777777777777 7!7"7#7$7%7&7'7(7)7*7+7,7-7.7/707172737475767778797:7;7<7=7>7?7@7A7B7C7D7E7F7G7H7I7J7K7L7M7N7O7P7Q7R7S7T7U7V7W7X7Y7Z7[7\7]7^7_7`7[5\5]5^5_5`5a5b5c5d5e5f5g5h5i5j5k5l5m5n5o5p5q5r5s5t5u5v5w5x5{5|5}5~55555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555666666666 6 6 6 6 666666666666666666 6!6"6#6$6%6&6'6(6)6*6+6,6-6.6/606162636465666768696:6;6<6=6>6?6@6A6B6C6D6E6F6G6H6I6J6K6L6M6N6O6P6Q6R6S6T6U6V6W6X6Y6Z6[6\6]6^6_6`6a6b6c6d6e6f6g6h6i6j6k6l6m6n6o6p6q6r6s6t6u6v6w6x6y6z6{6|6}6~66666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666666777777777 7 7 7 7 7777777777777777777 7!7"7#7$7%7&7'7(7)7*7+7,7-7.7/707172737475767778797:7;7<7=7>7?7@7A7B7C7D7E7F7G7H7I7J7K7L7M7N7O7P7Q7R7S7T7U7V7W7X7Y7Z7[7\7]7^7_7`7a7 35689:=>?@BCDEFGHIJKkm?@IJbefghiklmops{|}     LV_`jm O^qX b 7 /!p%q%r%s%t%u%w%R&'*377<@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@INRRRRRRRRRRRRRRRRRXG]x_maaabhiiiiiiiijjjjjjjjjjjjFkk l|lmmmmmnnnnmblblblbljjjjjjjjjXXRRRRRRRRR4444444444444444444444444444444444444444444444444444444444444444444\4SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS %45:@BDEGHOUegikwxjz ;?NPQ]j&*-.01789AEGJPabfgrstv /UH M Z ) 0#i&((((((((()377@@@AGG#GNNNlRmRnRoRpRqRrRuRRRRRRVXXX?Y@YIYF]h_v_y__labb bgAhhhhhhhhhhhhhhhiiii}jjjjjjj,k1k l$l_l`lql mmmn n nnn`l`l`l`l`l,k,k,kypt. There is no harm to allow it by default. - Update policy/mls for sockets related to access perm. Rules were contradictory. - Add nagios_run_pnp4nagios and nagios_run_sudo booleans to allow r un sudo from NRPE utils scripts and allow run nagios in conjunction w ith PNP4Nagios. Resolves:#1201054 - Don't use deprecated userdom_manage_tmpfs_role() interface calliing and use userdom_manage_tmp_role() instead. - Update virt_read_pid_files() interface to allow read also symlinks with virt_var_run_t type - Label /var/lib/tftpboot/aarch64(/.*)? and /var/lib/tftpboot/images2(/.*)? - Add support for iprdbg logging files in /var/log. - Add fixes to rhsmcertd_t - Allow puppetagent_t to transfer firewalld messages over dbus - Add support for /usr/libexec/mongodb-scl-helper RHSCL helper script. - Added label mysqld_etc_t for /etc/my.cnf.d/ dir. - Add support for mongod/mongos systemd unit files. - cloudinit and rhsmcertd need to communicate with dbus - Allow dovecot_t sys_resource capability- ALlow mongod execmem by default. - Update policy/mls for sockets. Rules were contradictory. Resolves:#1207133 - Allow a user to login with different security level via ssh.- Update seutil_manage_config() interface. Resolves:#1185962 - Allow pki-tomcat relabel pki_tomcat?XJy %45:@BDEGHOUegikwxjz  ;?NPQ]5789;=HQXj~%&)*+-.0124789:;<AEGJPQTZ]a < < dP|l`T L D  T H  d ` h h Txl`PD8 | p d X L D 0 (  | l P @ 4 $  | h \ L   @4 $ x l X L @ 8 $   | p h \ P < 0 $   tpdL0  thp T THPDH , x l   t h ` L D 0 (  l \ 8x { }                                                                 " % ) , l labels.incycL`7L  b a ku_IQ.incp6K s   a Rku.incTd labels.less"la.png"mkz.pngh"lky.pngdel"\kw.pngngtH8e<w3vGJku.jshlag.plodeh lag-TZ.plnky.plky-KG.plkw.plnkw-GB.plnku.plku-TR.pl lag_TZ.podklag.podn ky_KG.podkky.podn kw_GB.podkkw.podn ku_TR.podkvtkktma. kterm-color_ckterm-conktermekt7ixrkt7d.$kssl.htp_Wl l10nflist.cl6o. kw_gb.msg6@h@h@h@h@h@h@h@h@h@h@h@h@h@h@h@h@h@h@h@(@@@@(@(@(@(@U@U@U@@@@@@@ l LanguagesFL09n &=ISVWXY[ $ u v x  / !!#028 >!>@R]R^RaRRRRRRw__ffBhChiiiiiiiiiiSystem Environment/Base`V "331JRh Public Keys7IMail077788$8JSH77777788"8 HTML/JS/CSS777777778 8 8888888 8'8)83mHTML/JS DocumentationSdtBn\ V [ 7`fffgj{lmDevelopment/Tools@O9 nnnDevelopment/System7uaDevelopment/PerlDevelopment/Libraries 8eDGLq6F[(@@JJJWRkRRRRRRRRRRVX YJYaa b b bfffDgTgUghhj k9kkkkkklllll l!l"l#l%l&l'l(l)l*lylzllllllmmmmmmmm m m m mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnWlWlWlWlWlWlWlWlWlWlWlWlWlWlWlWlWlWlWlWlWlWlWlWlWlWlWlWlWlWlWlWlWlWlWlWlWlWlWlWlWlWl+k+k+kqgqgJYJYJYJYJYJYJYJYJYJYry@cpanel.net> - 2.4.55-1Tim Mullin - 2.4.54-2Tim Mullin - 2.4.54-1Tim Mullin - 2.4.53-2Tim Mullin - 2.4.53-1Travis Holloway - 2.4.52-3Tim Mullin - 2.4.52-2Travis Holloway - 2.4.52-1Tim Mullin - 2.4.51-2Cory McIntire - 2.4.51-1Cory McIntire - 2.4.50-1Daniel Muey - 2.4.49-4Cory McIntire - 2.4.49-3Travis Holloway - 2.4.49-2Cory McIntire - 2.4.49-1Travis Holloway - 2.4.48-5Daniel Muey - 2.4.48-4Travis HolP@ z eDGLq6F["L l u&&((J*K*l+o+)0022344 4!4"4#4$4)4*4+4,4.4/4142434G4H4I4K4L4M4O4P4Q4R4S4T4U4V4W4Y4Z4[4]4^4_4`4d4e4f4g4h4i4j4k4l4m4n4o4p4r4s4t4u4v4w4x4y4z4{4|4