openconnect is vulnerable to arbitrary code execution. A buffer overflow vulnerability occurs in the process_http_response
when a malicious server uses HTTP chunked encoding with malicious chunk sizes, resulting in arbitrary code execution.
lists.infradead.org/pipermail/openconnect-devel/2019-September/005412.html
lists.opensuse.org/opensuse-security-announce/2019-10/msg00060.html
lists.opensuse.org/opensuse-security-announce/2019-10/msg00061.html
lists.debian.org/debian-lts-announce/2019/10/msg00003.html
lists.fedoraproject.org/archives/list/[email protected]/message/FX56KYWC7X4ETV4P6HGJC7GZUEBITBBS/
lists.fedoraproject.org/archives/list/[email protected]/message/HDMZGNBLZZKAGBI2PNXYWWKLD2LXKFH6/
lists.fedoraproject.org/archives/list/[email protected]/message/WI7ZENFAWCHF2RU4NHPL2CU4WGZ4BNDJ/
seclists.org/bugtraq/2020/Jan/31
t2.fi/schedule/2019/
usn.ubuntu.com/4565-1/
www.debian.org/security/2020/dsa-4607