You're receiving this bug because the package in Summary has produced _FORTIFY_SOURCE related warnings indicating the presence of a sure overflow in a static buffer.
Even though this is not always an indication of a security problem it might even be. So please check this out ASAP.
By the way, _FORTIFY_SOURCE is disabled when you disable optimisation, so don't try finding out the cause using -O0.
Your friendly neighborhood tinderboxer
Created attachment 246601 [details]
+*eugene-3.6-r1 (10 Sep 2010)
+ 10 Sep 2010; Kacper Kowalik <email@example.com> -eugene-3.6.ebuild,
+ +eugene-3.6-r1.ebuild, +files/eugene-3.6-overflow.patch,
+ Fix overflows wrt bug 336604 and install path wrt bug 297536. Thanks to
+ Diego for the reports.
grrr wrong bug, sorry
The overflows in gmt_customio.c are because the code uses a char id, but uses it as a sequence of 4 bytes, rather than a 4 character string. It does not use a null terminator, but uses str* functions on it anyway. Unfortunately, the structure containing the char id is written to a file, so the array cannot simply be expanded.
Should use memcpy or strncpy then…
4.5.6 does not suffer from this issue. Closing as fixed.