EDK2’s Network Package is susceptible to a buffer overflow vulnerability when processing DNS Servers option from a DHCPv6 Advertise message. This
vulnerability can be exploited by an attacker to gain unauthorized
access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.
packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
www.openwall.com/lists/oss-security/2024/01/16/2
github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h
lists.fedoraproject.org/archives/list/[email protected]/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/
security.netapp.com/advisory/ntap-20240307-0011/