process_http_response in OpenConnect before 8.05 has a Buffer Overflow when a malicious server uses HTTP chunked encoding with crafted chunk sizes.
https://www.debian.org/security/2020/dsa-4607
https://usn.ubuntu.com/4565-1/
https://seclists.org/bugtraq/2020/Jan/31
https://lists.debian.org/debian-lts-announce/2019/10/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00061.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00060.html
http://lists.infradead.org/pipermail/openconnect-devel/2019-September/005412.html