Updated mlocate packages that fix several bugs are now available for Red HatEnterprise Linux 6.

The mlocate packages provide a locate/updatedb implementation, and keep adatabase of all existing files. The database allows files to be looked up bynames.This update fixes the following bugs:* Prior to this update, the cron script which is included in the mlocatepackages had permissions which were too loose. Consequently, mlocate did notcomply with the Operating System Security Requirements Guide. This updatechanges the permissions of the cron script to 0700, as required by the guide.(BZ#1012534)* The updatedb utility automatically excludes file systems which are marked as”nodev” in the /proc/filesystems file. The ZFS file system is also marked thisway despite the fact it actually stores data on a physical device. As aconsequence, ZFS volumes were not previously indexed. This update adds anexception for ZFS, which allows updatedb to index files stored on this filesystem and the locate utility to find such files. (BZ#1023779)* Previously, the /var/lib/mlocate/mlocate.db database file was declared in themlocate package metadata as belonging to the “root” user and group, and havingthe “644” permissions. However, in reality, the file belonged to the “slocate”group and had the “640” permissions. This discrepancy caused problems reportedby OpenSCAP compliance checking tools. With this update, the database file isdeclared correctly in the metadata, which allows the package in an unalteredstate to pass OpenSCAP compliance checks. (BZ#1182304)* The updatedb utility did not exclude GPFS cluster file systems, which can holdbillions of files. As a consequence, updatedb caused very high I/O load onsystems using GPFS. With this update, GPFS volumes are skipped by updatedb. As aresult, files stored on this file system are no longer indexed, and runningupdatedb on systems with GPFS volumes does not cause too high I/O load.(BZ#1168301)Users of mlocate are advised to upgrade to these updated packages, which fixthese bugs.
Before applying this update, make sure all previously released errata relevantto your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop FasTrack (v. 6)

SRPMS:
mlocate-0.22.2-6.el6.src.rpm
    MD5: 68fbec5f16fbbd63036c9a8f367d8863SHA-256: 5c0f82b23b1b79b8e1b56153f08b88a87b037e10f01f56ea5485414fdeba3974
 
IA-32:
mlocate-0.22.2-6.el6.i686.rpm
    MD5: 5925ceca2452719d6649de6cdf7ffa08SHA-256: 6f1ecabc05f1b830e60bd906ed556b00e927433a1b01d98f5b0159fe349cbc8e
mlocate-debuginfo-0.22.2-6.el6.i686.rpm
    MD5: 93dd48aee0eb7a0a588712547d92852dSHA-256: 3a81ed8506a09ccf23085df8bf25487814fe94d7038872a5fcfbbb08af83a932
 
x86_64:
mlocate-0.22.2-6.el6.x86_64.rpm
    MD5: 858e00e177b089be48103fa9e693770cSHA-256: 2b7bb5d962dbce542be7858579cca3487d48d437c6e22492c387be793c8792dc
mlocate-debuginfo-0.22.2-6.el6.x86_64.rpm
    MD5: 2b4a9a92b7b3f04df4338a40f2dd03bdSHA-256: 5c3d4edec9286b95ecb757a6ef28a9528a045a4b60eec03ed8fb60a66c7206b3
 
Red Hat Enterprise Linux HPC Node FasTrack (v. 6)

SRPMS:
mlocate-0.22.2-6.el6.src.rpm
    MD5: 68fbec5f16fbbd63036c9a8f367d8863SHA-256: 5c0f82b23b1b79b8e1b56153f08b88a87b037e10f01f56ea5485414fdeba3974
 
x86_64:
mlocate-0.22.2-6.el6.x86_64.rpm
    MD5: 858e00e177b089be48103fa9e693770cSHA-256: 2b7bb5d962dbce542be7858579cca3487d48d437c6e22492c387be793c8792dc
mlocate-debuginfo-0.22.2-6.el6.x86_64.rpm
    MD5: 2b4a9a92b7b3f04df4338a40f2dd03bdSHA-256: 5c3d4edec9286b95ecb757a6ef28a9528a045a4b60eec03ed8fb60a66c7206b3
 
Red Hat Enterprise Linux Server FasTrack (v. 6)

SRPMS:
mlocate-0.22.2-6.el6.src.rpm
    MD5: 68fbec5f16fbbd63036c9a8f367d8863SHA-256: 5c0f82b23b1b79b8e1b56153f08b88a87b037e10f01f56ea5485414fdeba3974
 
IA-32:
mlocate-0.22.2-6.el6.i686.rpm
    MD5: 5925ceca2452719d6649de6cdf7ffa08SHA-256: 6f1ecabc05f1b830e60bd906ed556b00e927433a1b01d98f5b0159fe349cbc8e
mlocate-debuginfo-0.22.2-6.el6.i686.rpm
    MD5: 93dd48aee0eb7a0a588712547d92852dSHA-256: 3a81ed8506a09ccf23085df8bf25487814fe94d7038872a5fcfbbb08af83a932
 
PPC:
mlocate-0.22.2-6.el6.ppc64.rpm
    MD5: 63ea08d8a412a04126cce25b77edfe7cSHA-256: dce1e9174f310d6759634e342dd6de854dabf55046a44b93e41ba2403cc2f7c4
mlocate-debuginfo-0.22.2-6.el6.ppc64.rpm
    MD5: 712ba6df9260d4f182c6da26af566846SHA-256: e6c2b0465762c52cdcc17b9ef82c5b6500e1a795342ce95e498d06be29425ff5
 
s390x:
mlocate-0.22.2-6.el6.s390x.rpm
    MD5: b9112240fbf32a84698ff45bd70e0f14SHA-256: d0ce04465db46bea639abde0f3a4d01229e4bce824fa1067e271ff1200647886
mlocate-debuginfo-0.22.2-6.el6.s390x.rpm
    MD5: 486ba6858d3d390f5a214cfaad7f7f08SHA-256: 3d2c6c4d88c00f856b3e7fd47c099bb6c42a419a050adaff97cd55296effb77e
 
x86_64:
mlocate-0.22.2-6.el6.x86_64.rpm
    MD5: 858e00e177b089be48103fa9e693770cSHA-256: 2b7bb5d962dbce542be7858579cca3487d48d437c6e22492c387be793c8792dc
mlocate-debuginfo-0.22.2-6.el6.x86_64.rpm
    MD5: 2b4a9a92b7b3f04df4338a40f2dd03bdSHA-256: 5c3d4edec9286b95ecb757a6ef28a9528a045a4b60eec03ed8fb60a66c7206b3
 
Red Hat Enterprise Linux Workstation FasTrack (v. 6)

SRPMS:
mlocate-0.22.2-6.el6.src.rpm
    MD5: 68fbec5f16fbbd63036c9a8f367d8863SHA-256: 5c0f82b23b1b79b8e1b56153f08b88a87b037e10f01f56ea5485414fdeba3974
 
IA-32:
mlocate-0.22.2-6.el6.i686.rpm
    MD5: 5925ceca2452719d6649de6cdf7ffa08SHA-256: 6f1ecabc05f1b830e60bd906ed556b00e927433a1b01d98f5b0159fe349cbc8e
mlocate-debuginfo-0.22.2-6.el6.i686.rpm
    MD5: 93dd48aee0eb7a0a588712547d92852dSHA-256: 3a81ed8506a09ccf23085df8bf25487814fe94d7038872a5fcfbbb08af83a932
 
x86_64:
mlocate-0.22.2-6.el6.x86_64.rpm
    MD5: 858e00e177b089be48103fa9e693770cSHA-256: 2b7bb5d962dbce542be7858579cca3487d48d437c6e22492c387be793c8792dc
mlocate-debuginfo-0.22.2-6.el6.x86_64.rpm
    MD5: 2b4a9a92b7b3f04df4338a40f2dd03bdSHA-256: 5c3d4edec9286b95ecb757a6ef28a9528a045a4b60eec03ed8fb60a66c7206b3
 
(The unlinked packages above are only available from the Red Hat Network)
1023779 – ZFS filesystems not being indexed1182304 – incorrect specification of ghost file mlocate.db in mlocate package

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply