You're receiving this bug because the package in Summary has produced _FORTIFY_SOURCE related warnings indicating the presence of a sure overflow in a static buffer. Even though this is not always an indication of a security problem it might even be. So please check this out ASAP. By the way, _FORTIFY_SOURCE is disabled when you disable optimisation, so don't try finding out the cause using -O0. Thanks, Your friendly neighborhood tinderboxer
Created attachment 249234 [details] Build log
Created attachment 249253 [details, diff] Patch to ivtv-utils-1.4.0-r1.ebuild to address overflow The helper method pts_to_string uses either the caller supplied buffer or, if none is supplied, an internal buffer of length 256. Regardless, it uses the size of its internal buffer. The source fortification warning triggered because a caller supplied a buffer of only length 64, so specifying the length of 256 is wrong in that case. Although it looks like the 64 character buffer would be sufficient to hold the output, I elected to increase the 64 character buffer instead of shrinking the static buffer. Also, I included a transform of sprintf => snprintf in various source files after confirming that all such transforms will have a correct sizeof result. This should provide protection against any latent overruns since some of the sprintf calls use what appear to be externally derived values.
applied the changes in as a normal patch for 1.4.1, closing