The DTLS implementation in GnuTLS 3.0.10 and earlier executes certain
error-handling code only if there is a specific relationship between a
padding length and the ciphertext size, which makes it easier for remote
attackers to recover partial plaintext via a timing side-channel attack, a
related issue to CVE-2011-4108.
GnuTLS 2.x does not support DTLS; this issue was fixed in 3.0.11. Our only affected ebuild was =net-libs/gnutls-3.0.10 which was in p.mask while it was in the tree.