the escalation is wrong. there exist several workarounds for it (lowering the optimization, using gcc-4.8, ...). I asked the ARM porters to address this properly (Hector on IRC agreed to forward this), however I don't see any progress here. Now CCing debian-arm explicitly.
On 12/23/2014 11:48 AM, Santiago Vila wrote: > severity 764732 serious > thanks > > On Fri, 10 Oct 2014, Hector Oron wrote: > >> Package: gcc-4.9 >> Version: 4.9.1-16 >> Severity: important >> >> Hello, >> >> Found a FTBFS while trying to build unzip package in Debian/sid on armhf >> host. >> >> [...] > > Yesterday, I uploaded unzip 6.0-13 fixing several security bugs, but > it will not migrate to testing because of this, which has just been > reported against unzip as Bug #773785. > > Since this is really a gcc bug, I'm raising the severity accordingly. > > Please tell me about the likelihood that this is indeed fixed in gcc, > because if it's low I will have to look for a workaround in unzip > (such as lowering the optimization level). > > Thanks. > > -- To UNSUBSCRIBE, email to debian-gcc-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/549b9ca6.6030...@debian.org