You're receiving this bug because the package in Summary has produced _FORTIFY_SOURCE related warnings indicating the presence of a sure overflow in a static buffer. Even though this is not always an indication of a security problem it might even be. So please check this out ASAP. By the way, _FORTIFY_SOURCE is disabled when you disable optimisation, so don't try finding out the cause using -O0. Thanks, Your friendly neighborhood tinderboxer
Created attachment 252409 [details] Build log
Created attachment 257515 [details, diff] Patch to g15daemon-1.9.5.3-r3.ebuild to resolve reported overflow Upstream uses a hardcoded size of 10 for recv, but passes a buffer that is only int[2], which is too small. It happens to work for the intended use since they really only expect to receive 1 byte, but this patch fixes it so that the argument to recv specifies the proper length.
*** Bug 354921 has been marked as a duplicate of this bug. ***
Fixed in r4 (used the patch from the other bug).