Back to bug 1313308

Who When What Removed Added
Jaroslav Reznik 2016-03-01 11:23:34 UTC Link ID Sourceware 15073 Red Hat Knowledge Base (Solution) 2173041
Efi Cohen 2016-03-28 21:59:00 UTC CC efi
Carlos O'Donell 2016-03-31 03:45:29 UTC Status NEW ASSIGNED
Carlos O'Donell 2016-04-04 20:11:34 UTC Status ASSIGNED MODIFIED
errata-xmlrpc 2016-04-04 21:30:37 UTC Status MODIFIED ON_QA
Trinh Dao 2016-04-11 20:36:35 UTC Blocks 1097825
Michael Petlan 2016-04-22 16:39:59 UTC CC mpetlan
Michael Petlan 2016-04-22 17:42:59 UTC Status ON_QA VERIFIED
Deepu K S 2016-04-25 17:09:48 UTC CC dkochuka
Milan Navratil 2016-05-09 12:30:28 UTC CC mnavrati
Doc Text Previously, certain code paths used by the C library's memory allocator "fastbins" feature, which were enabled by default, were not thread-safe. When the non-safe code paths executed, the code paths could cause corruption in the allocator, which cause the application terminate unexpectedly with a segmentation fault. The thread-unsafe code paths have been made thread-safe, and the described problem no longer occurs.
errata-xmlrpc 2016-05-12 00:56:11 UTC Status VERIFIED RELEASE_PENDING
errata-xmlrpc 2016-05-12 09:59:37 UTC Status RELEASE_PENDING CLOSED
Resolution --- ERRATA
Last Closed 2016-05-12 05:59:37 UTC
Florian Weimer 2016-09-01 14:16:24 UTC Fixed In Version glibc-2.17-106.el7_2.6

Back to bug 1313308