You're receiving this bug because the package in Summary has produced _FORTIFY_SOURCE related warnings indicating the presence of a sure overflow in a static buffer.
Even though this is not always an indication of a security problem it might even be. So please check this out ASAP.
By the way, _FORTIFY_SOURCE is disabled when you disable optimisation, so don't try finding out the cause using -O0.
Your friendly neighborhood tinderboxer
Created attachment 246599 [details]
Created attachment 246798 [details, diff]
Patch to scourge-0.21.1.ebuild to add a sed to fix the overflow
The upstream code declares char tmp, then tells snprintf that the buffer is 256 characters long. The sed fixes it to use sizeof(tmp) in the call to snprintf.
Fixed in portage. Thanks for the patch.