ConnMan (aka Connection Manager) 1.30 through 1.39 has a stack-based buffer overflow in uncompress in dnsproxy.c via NAME, RDATA, or RDLENGTH (for A or AAAA).
Gentoo Linux Security Advisory 202107-29 - A buffer overflow in ConnMan might allow remote attacker(s) to execute arbitrary code. Versions less than 1.40 are affected.