openjdk is vulnerable to authorization bypass. Improper checks of SASL message properties in GssKrb5Base allows an attacker to perform unauthorized update, insert or delete of data.
lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
access.redhat.com/errata/RHSA-2020:0122
access.redhat.com/errata/RHSA-2020:0128
access.redhat.com/errata/RHSA-2020:0157
access.redhat.com/errata/RHSA-2020:0196
access.redhat.com/errata/RHSA-2020:0202
access.redhat.com/errata/RHSA-2020:0231
access.redhat.com/errata/RHSA-2020:0232
access.redhat.com/errata/RHSA-2020:0541
access.redhat.com/errata/RHSA-2020:0632
access.redhat.com/security/updates/classification/#important
kc.mcafee.com/corporate/index?page=content&id=SB10315
lists.debian.org/debian-lts-announce/2020/02/msg00034.html
seclists.org/bugtraq/2020/Feb/22
seclists.org/bugtraq/2020/Jan/24
security.gentoo.org/glsa/202101-19
security.netapp.com/advisory/ntap-20200122-0003/
usn.ubuntu.com/4257-1/
www.debian.org/security/2020/dsa-4605
www.debian.org/security/2020/dsa-4621
www.oracle.com/security-alerts/cpujan2020.html