DENX U-Boot through 2018.09-rc1 has a remotely exploitable buffer overflow via a malicious TFTP server because TFTP traffic is mishandled. Also, local exploitation can occur via a crafted kernel image.
{ "binaries": [ { "binary_version": "2016.01+dfsg1-2ubuntu5", "binary_name": "u-boot" }, { "binary_version": "2016.01+dfsg1-2ubuntu5", "binary_name": "u-boot-exynos" }, { "binary_version": "2016.01+dfsg1-2ubuntu5", "binary_name": "u-boot-imx" }, { "binary_version": "2016.01+dfsg1-2ubuntu5", "binary_name": "u-boot-omap" }, { "binary_version": "2016.01+dfsg1-2ubuntu5", "binary_name": "u-boot-rockchip" }, { "binary_version": "2016.01+dfsg1-2ubuntu5", "binary_name": "u-boot-rpi" }, { "binary_version": "2016.01+dfsg1-2ubuntu5", "binary_name": "u-boot-sunxi" }, { "binary_version": "2016.01+dfsg1-2ubuntu5", "binary_name": "u-boot-tegra" }, { "binary_version": "2016.01+dfsg1-2ubuntu5", "binary_name": "u-boot-tools" } ] }