A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.
https://www.openwall.com/lists/oss-security/2021/02/08/2
https://www.debian.org/security/2021/dsa-4847
https://security.gentoo.org/glsa/202107-29
https://lists.debian.org/debian-lts-announce/2021/02/msg00013.html
https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog