openjdk is vulnerable to authorizatino bypass. XML validation manipulation due to incomplete application of the use-grammar-pool-only feature allows an attacker to perform unauthorized update, insert and delete operations.
lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
access.redhat.com/errata/RHSA-2020:2972
access.redhat.com/security/updates/classification/#important
kc.mcafee.com/corporate/index?page=content&id=SB10332
lists.apache.org/thread.html/rf96c5afb26b596b4b97883aa90b6c0b0fc4c26aaeea7123c21912103@%3Cj-users.xerces.apache.org%3E
lists.debian.org/debian-lts-announce/2020/08/msg00021.html
lists.fedoraproject.org/archives/list/[email protected]/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
lists.fedoraproject.org/archives/list/[email protected]/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
lists.fedoraproject.org/archives/list/[email protected]/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
lists.fedoraproject.org/archives/list/[email protected]/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
security.gentoo.org/glsa/202008-24
security.gentoo.org/glsa/202209-15
security.netapp.com/advisory/ntap-20200717-0005/
usn.ubuntu.com/4433-1/
usn.ubuntu.com/4453-1/
www.debian.org/security/2020/dsa-4734
www.oracle.com/security-alerts/cpujul2020.html