Versions 0.8.0 through 0.8.3 are vulnerable to critical denial-of-service attack, there are also another vulnerabilities: CVE-2013-4165 , CVE-2013-4627 and bug fixes. Please bump version, no other changes in ebuild should be necessary. Exactly same concern is with net-p2p/bitcoin-qt . Reproducible: Always
Security issues --------------- An attacker could send a series of messages that resulted in an integer division-by-zero error in the Bloom Filter handling code, causing the Bitcoin-Qt or bitcoind process to crash. Bloom filters were introduced with version 0.8, so versions 0.8.0 through 0.8.3 are vulnerable to this critical denial-of-service attack. A constant-time algorithm is now used to check RPC password guess attempts; fixes https://github.com/bitcoin/bitcoin/issues/2838 (CVE-2013-4165) Implement a better fix for the fill-memory-with-orphan-transactions attack that was fixed in 0.8.3. See https://bitslog.wordpress.com/2013/07/18/buggy-cve-2013-4627-patch-open-new-vectors-of-attack/ for a description of the weaknesses of the previous fix. (CVE-2013-4627)
CVE-2013-4165 is already in Bug 478286
0.8.4 should be in the tree now for stabilisation