You're receiving this bug because the package in Summary has produced _FORTIFY_SOURCE related warnings indicating the presence of a sure overflow in a static buffer. Even though this is not always an indication of a security problem it might even be. So please check this out ASAP. By the way, _FORTIFY_SOURCE is disabled when you disable optimisation, so don't try finding out the cause using -O0. Thanks, Your friendly neighborhood tinderboxer
Created attachment 250011 [details] Build log
Created attachment 250043 [details, diff] Patch to hping-3_pre20051105-r2.ebuild to address memcpy overflow The value passed as sizeof() to the memcpy was unrelated to the value being filled by the memcpy, so the computed size was too big. This patch adds a sed to rewrite the offending memcpy to use sizeof on the value receiving the data.
Fixed in hping-3_pre20051105-r3.ebuild.