A buffer overflow was found during UTF8 to Unicode string conversion within JavaScript with extremely large amounts of data. This vulnerability requires the use of a malicious or vulnerable legacy extension in order to occur. This vulnerability affects Thunderbird ESR < 52.8, Thunderbird < 52.8, and Firefox ESR < 52.8.
https://www.mozilla.org/security/advisories/mfsa2018-13/
https://www.mozilla.org/security/advisories/mfsa2018-12/
https://www.debian.org/security/2018/dsa-4209
https://www.debian.org/security/2018/dsa-4199
https://usn.ubuntu.com/3660-1/
https://security.gentoo.org/glsa/201811-13
https://security.gentoo.org/glsa/201810-01
https://lists.debian.org/debian-lts-announce/2018/05/msg00013.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00007.html
https://bugzilla.mozilla.org/show_bug.cgi?id=1443891
https://access.redhat.com/errata/RHSA-2018:1726
https://access.redhat.com/errata/RHSA-2018:1725
https://access.redhat.com/errata/RHSA-2018:1415
https://access.redhat.com/errata/RHSA-2018:1414