Mozilla is vulnerable to a Buffer overflow in SCTP chunk input validation.
lists.opensuse.org/opensuse-security-announce/2020-07/msg00000.html
packetstormsecurity.com/files/158480/usrsctp-Stack-Buffer-Overflow.html
access.redhat.com/errata/RHSA-2020:2033
access.redhat.com/security/updates/classification/#critical
bugzilla.mozilla.org/show_bug.cgi?id=1632241
security.gentoo.org/glsa/202005-03
security.gentoo.org/glsa/202005-04
usn.ubuntu.com/4373-1/
www.debian.org/security/2020/dsa-4714
www.mozilla.org/security/advisories/mfsa2020-16/
www.mozilla.org/security/advisories/mfsa2020-17/
www.mozilla.org/security/advisories/mfsa2020-18/