A lot of safe bugfixes have been committed during the last month to upstream 4.8 branch, which is a release branch, limited to regression and documentation fixes only. These are low risks, often wrong code bugfixes, or e.g. fixes requested by the kernel people (e.g. PR59625). http://gcc.gnu.org/PR54300 http://gcc.gnu.org/PR54570 http://gcc.gnu.org/PR55946 http://gcc.gnu.org/PR56060 http://gcc.gnu.org/PR57042 http://gcc.gnu.org/PR57386 http://gcc.gnu.org/PR58630 http://gcc.gnu.org/PR58668 http://gcc.gnu.org/PR58954 http://gcc.gnu.org/PR58956 http://gcc.gnu.org/PR58998 http://gcc.gnu.org/PR59125 http://gcc.gnu.org/PR59137 http://gcc.gnu.org/PR59255 http://gcc.gnu.org/PR59362 http://gcc.gnu.org/PR59436 http://gcc.gnu.org/PR59470 http://gcc.gnu.org/PR59493 http://gcc.gnu.org/PR59584 http://gcc.gnu.org/PR59587 http://gcc.gnu.org/PR59610 http://gcc.gnu.org/PR59612 http://gcc.gnu.org/PR59625 http://gcc.gnu.org/PR59647 http://gcc.gnu.org/PR59652 http://gcc.gnu.org/PR59654 http://gcc.gnu.org/PR59715 http://gcc.gnu.org/PR59724 http://gcc.gnu.org/PR59730 http://gcc.gnu.org/PR59745 http://gcc.gnu.org/PR59772
All patches in place and relevant tests in the testsuite passed. Verified for gcc-4.8.2-12.el7.
This request was resolved in Red Hat Enterprise Linux 7.0. Contact your manager or support representative in case you have further questions about the request.