You're receiving this bug because the package in Summary has produced _FORTIFY_SOURCE related warnings indicating the presence of a sure overflow in a static buffer. Even though this is not always an indication of a security problem it might even be. So please check this out ASAP. By the way, _FORTIFY_SOURCE is disabled when you disable optimisation, so don't try finding out the cause using -O0. Thanks, Your friendly neighborhood tinderboxer
Created attachment 246599 [details] Build log
Created attachment 246798 [details, diff] Patch to scourge-0.21.1.ebuild to add a sed to fix the overflow The upstream code declares char tmp[255], then tells snprintf that the buffer is 256 characters long. The sed fixes it to use sizeof(tmp) in the call to snprintf.
Fixed in portage. Thanks for the patch.