Description
In Eclipse Openj9 before version 0.35.0, interface calls can be inlined without a runtime type check. Malicious bytecode could make use of this inlining to access or modify memory via an incompatible type.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-43035 | In Eclipse Openj9 before version 0.35.0, interface calls can be inlined without a runtime type check. Malicious bytecode could make use of this inlining to access or modify memory via an incompatible type. |
References
History
Wed, 07 May 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: eclipse
Published:
Updated: 2025-05-07T15:59:25.715Z
Reserved: 2022-10-24T00:00:00.000Z
Link: CVE-2022-3676
Updated: 2024-08-03T01:14:03.367Z
Status : Modified
Published: 2022-10-24T14:15:51.953
Modified: 2025-05-07T16:15:20.613
Link: CVE-2022-3676
No data.
OpenCVE Enrichment
No data.
EUVD