CVE-2022-3676

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2022-3676
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-3676.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-3676
Related
Published
2022-10-24T14:15:51Z
Modified
2024-09-03T07:46:07.434998Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

In Eclipse Openj9 before version 0.35.0, interface calls can be inlined without a runtime type check. Malicious bytecode could make use of this inlining to access or modify memory via an incompatible type.

References

Affected packages

Git / github.com/eclipse/openj9

Affected ranges

Type
GIT
Repo
https://github.com/eclipse/openj9
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

openj9-0.*

openj9-0.0
openj9-0.0M1
openj9-0.0RC2
openj9-0.10.0-rc1
openj9-0.11.0
openj9-0.11.0-rc1
openj9-0.11.0-rc2
openj9-0.12.0-m1
openj9-0.12.0-m2
openj9-0.12.0-rc1
openj9-0.16.0-m1
openj9-0.17.0-m1
openj9-0.18.0-m1
openj9-0.19.0-m1
openj9-0.20.0-m1
openj9-0.21.0-m1
openj9-0.22.0-m1
openj9-0.23.0-m1
openj9-0.24.0-m1
openj9-0.26.0-m1
openj9-0.27.0-m1
openj9-0.29.0-m1
openj9-0.30.0-m1
openj9-0.30.0-m1a
openj9-0.33.0-m1
openj9-0.35.0-m1
openj9-0.35.0-m2
openj9-0.35.0-m2a
openj9-0.35.0-m2b
openj9-0.8.0
openj9-0.8.0-rc1
openj9-0.8.0-rc2
openj9-0.9.0-rc1