OpenConnect before 2.26 places the webvpn cookie value in the debugging output, which might allow remote attackers to obtain sensitive information by reading this output, as demonstrated by output posted to the public openconnect-devel mailing list.
lists.fedoraproject.org/pipermail/package-announce/2010-November/051620.html
lists.fedoraproject.org/pipermail/package-announce/2010-November/051637.html
lists.fedoraproject.org/pipermail/package-announce/2010-November/051640.html
secunia.com/advisories/42381
www.infradead.org/openconnect.html
www.securityfocus.com/bid/44111
www.vupen.com/english/advisories/2010/3078