You're receiving this bug because the package in Summary has produced _FORTIFY_SOURCE related warnings indicating the presence of a sure overflow in a static buffer. Even though this is not always an indication of a security problem it might even be. So please check this out ASAP. By the way, _FORTIFY_SOURCE is disabled when you disable optimisation, so don't try finding out the cause using -O0. Thanks, Your friendly neighborhood tinderboxer
Created attachment 246601 [details] Build log
+*eugene-3.6-r1 (10 Sep 2010) + + 10 Sep 2010; Kacper Kowalik <xarthisius@gentoo.org> -eugene-3.6.ebuild, + +eugene-3.6-r1.ebuild, +files/eugene-3.6-overflow.patch, + +files/eugene-3.6-plugins.patch: + Fix overflows wrt bug 336604 and install path wrt bug 297536. Thanks to + Diego for the reports. +
grrr wrong bug, sorry
The overflows in gmt_customio.c are because the code uses a char id[4], but uses it as a sequence of 4 bytes, rather than a 4 character string. It does not use a null terminator, but uses str* functions on it anyway. Unfortunately, the structure containing the char id[4] is written to a file, so the array cannot simply be expanded.
Should use memcpy or strncpy then…
4.5.6 does not suffer from this issue. Closing as fixed.