CVE-2012-3291 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3291): Heap-based buffer overflow in OpenConnect 3.18 allows remote servers to cause a denial of service via a crafted greeting banner.
So, the author of the package, David Woodhouse, just released version 4.00, which includes support for GnuTLS, as well as lots of other neat stuff. Good time to update the ebuild. "This release has full functionality even with GnuTLS 2.12, although it uses OpenSSL for DTLS in that case. The GnuTLS support code is cleaned up a little... and then made messier by adding support for the old OpenSSL encrypted PEM files." ftp://ftp.infradead.org/pub/openconnect/openconnect-4.00.tar.gz ftp://ftp.infradead.org/pub/openconnect/openconnect-4.00.tar.gz.asc
4.07-r1 was added
(In reply to comment #2) > 4.07-r1 was added Thanks, Pacho. Please don't forget to cleanup vulnerable versions. Closing noglsa for ~arch only.