It was discovered that there was a potential buffer overflow and denial of service vulnerabilty in the gdhcp client implementation of connman, a command-line network manager designed for use on embedded devices.
For the stable distribution (bullseye), this problem has been fixed in version 1.36-2.2+deb11u2.
We recommend that you upgrade your connman packages.
For the detailed security status of connman please refer to its security tracker page at: \ https://security-tracker.debian.org/tracker/connman