You're receiving this bug because the package in Summary has produced _FORTIFY_SOURCE related warnings indicating the presence of a sure overflow in a static buffer. Even though this is not always an indication of a security problem it might even be. So please check this out ASAP. By the way, _FORTIFY_SOURCE is disabled when you disable optimisation, so don't try finding out the cause using -O0. Thanks, Your friendly neighborhood tinderboxer
Created attachment 247356 [details] Build log
Looks like an false positive. The code in question is: rac_record racdata; ... rc = fgets((char *)&racdata, sizeof(racdata), fdb); That looks perfectly legal to me, but the __bos macro seems to get the size of the buffer wrong (counting the struct members and checking sizeof() gives the same value as used by the program - 480). Any idea to give the compiler a simple hint about the size of the buffer?
+*xastir-1.9.8-r1 (24 Sep 2010) + + 24 Sep 2010; Thomas Beierlein <tomjbe@gentoo.org> +xastir-1.9.8-r1.ebuild, + +files/xastir-1.9.8-fortify.diff: + Fix for bug #337365 (Thanks Diego for reporting) and fix installdir for + doc files +