In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c do_rename_gpt_parts() function. Double freeing may result in a write-what-where condition, allowing an attacker to execute arbitrary code. NOTE: this vulnerablity was introduced when attempting to fix a memory leak identified by static analysis.
https://www.mail-archive.com/u-boot%40lists.denx.de/msg354114.html
https://www.mail-archive.com/u-boot%40lists.denx.de/msg354060.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00030.html