process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes.
lists.infradead.org/pipermail/openconnect-devel/2019-September/005412.html
lists.opensuse.org/opensuse-security-announce/2019-10/msg00060.html
lists.opensuse.org/opensuse-security-announce/2019-10/msg00061.html
lists.debian.org/debian-lts-announce/2019/10/msg00003.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FX56KYWC7X4ETV4P6HGJC7GZUEBITBBS/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HDMZGNBLZZKAGBI2PNXYWWKLD2LXKFH6/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WI7ZENFAWCHF2RU4NHPL2CU4WGZ4BNDJ/
seclists.org/bugtraq/2020/Jan/31
t2.fi/schedule/2019/
usn.ubuntu.com/4565-1/
www.debian.org/security/2020/dsa-4607