You're receiving this bug because the package in Summary has produced _FORTIFY_SOURCE related warnings indicating the presence of a sure overflow in a static buffer.
Even though this is not always an indication of a security problem it might even be. So please check this out ASAP.
By the way, _FORTIFY_SOURCE is disabled when you disable optimisation, so don't try finding out the cause using -O0.
Your friendly neighborhood tinderboxer
Created attachment 247356 [details]
Looks like an false positive. The code in question is:
rc = fgets((char *)&racdata, sizeof(racdata), fdb);
That looks perfectly legal to me, but the __bos macro seems to get the size of the buffer wrong (counting the struct members and checking sizeof() gives the same value as used by the program - 480).
Any idea to give the compiler a simple hint about the size of the buffer?
+*xastir-1.9.8-r1 (24 Sep 2010)
+ 24 Sep 2010; Thomas Beierlein <firstname.lastname@example.org> +xastir-1.9.8-r1.ebuild,
+ Fix for bug #337365 (Thanks Diego for reporting) and fix installdir for
+ doc files