OpenJDK is vulnerable to denial of service (DoS). It is due to an incorrect handling of nested jar: URLs in Jar URL handler.
lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
access.redhat.com/errata/RHSA-2019:3128
access.redhat.com/errata/RHSA-2019:3134
access.redhat.com/errata/RHSA-2019:3135
access.redhat.com/errata/RHSA-2019:3136
access.redhat.com/errata/RHSA-2019:3157
access.redhat.com/errata/RHSA-2019:3158
access.redhat.com/errata/RHSA-2019:4109
access.redhat.com/errata/RHSA-2019:4110
access.redhat.com/errata/RHSA-2019:4113
access.redhat.com/errata/RHSA-2019:4115
access.redhat.com/errata/RHSA-2020:0006
access.redhat.com/errata/RHSA-2020:0046
access.redhat.com/security/updates/classification/#important
lists.debian.org/debian-lts-announce/2019/12/msg00005.html
seclists.org/bugtraq/2019/Oct/27
seclists.org/bugtraq/2019/Oct/31
security.netapp.com/advisory/ntap-20191017-0001/
usn.ubuntu.com/4223-1/
www.debian.org/security/2019/dsa-4546
www.debian.org/security/2019/dsa-4548