In Eclipse Openj9 before version 0.35.0, interface calls can be inlined without a runtime type check. Malicious bytecode could make use of this inlining to access or modify memory via an incompatible type.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-43035 | In Eclipse Openj9 before version 0.35.0, interface calls can be inlined without a runtime type check. Malicious bytecode could make use of this inlining to access or modify memory via an incompatible type. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 07 May 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: eclipse
Published:
Updated: 2025-05-07T15:59:25.715Z
Reserved: 2022-10-24T00:00:00.000Z
Link: CVE-2022-3676
Updated: 2024-08-03T01:14:03.367Z
Status : Modified
Published: 2022-10-24T14:15:51.953
Modified: 2025-05-07T16:15:20.613
Link: CVE-2022-3676
No data.
OpenCVE Enrichment
No data.
EUVD