package: src:gcc-6
version: 6.4.0-18
severity: grave
control: affects -1 src:chromium-browser
forwarded: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=86166
This was marked as a duplicate upstream and closed, but it seems like
it should be considered a separate issue.
The latest chromium upload no
package: src:gcc-8
severity: normal
version: 8.1.0-3
Wine now relies on this [0], but it seems to be missing in gcc on
arm64. It is supported in newer versions of clang on arm64.
Best wishes,
Mike
[0]https://buildd.debian.org/status/fetch.php?pkg=wine-development&arch=arm64&ver=3.8-1&stamp=1526
control: tag -1 patch
A patch for the autoconf rc issues is available in bug #695704 for autoconf2.59.
Best wishes,
Mike
--
To UNSUBSCRIBE, email to debian-gcc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive:
https://lists.debian.
On Fri, Oct 10, 2014 at 3:23 AM, Matthias Klose wrote:
> Am 10.10.2014 um 06:39 schrieb Adam D. Barratt:
>> On Thu, 2014-10-09 at 23:01 -0400, Michael Gilbert wrote:
>>> Note that the window for the next stable update is closing in about a
>>> week, so there isn'
Hi,
I would like to ask for your opinion about uploading a newer gcc
version to wheezy?
This is to be able to continue building chromium security updates,
which has been discussed with the release team [0]. They've requested
that I discuss it with gcc maintainers, which is the reason for this
me
package: src:gcc-4.4, src:gcc-4.6, src:gcc-4.7, src:gcc-4.8, src:gcc-4.9
severity: serious
tags: security
Several integer overflow issues affecting all gcc versions have been
fixed in libgfortran:
http://www.openwall.com/lists/oss-security/2014/07/23/7
Best wishes,
Mike
--
To UNSUBSCRIBE, emai
On Fri, Jun 14, 2013 at 6:07 AM, Matthias Klose wrote:
> this is #402694. It is disappointing that the security did become a management
> only team. Note that this is an issue, where even a member of the security
> team
> is involved upstream, doesn't comment, doesn't backport the patch upstream,
Package: gcc-4.7
Severity: serious
Version: 4.7.0-1
Tags: security, patch
Hi,
An integer overflow issue was discovered for gcc-4.7:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2002-2439
This is already fixed in gcc-4.8.
These seem to be the two relevant patches that fix the problem:
http://g
Sorry about that, it was a bug mistype.
On 11/27/06, Nikita V. Youshchenko <[EMAIL PROTECTED]> wrote:
Hello.
I've seen some activity posted from your address to debian BTS regarding
#390093.
I believe this issue was fixed long ago. Was this a plain mistake (e.g. bug
number mistype), or the iss
9 matches
Mail list logo