Description
In Eclipse Openj9 before version 0.35.0, interface calls can be inlined without a runtime type check. Malicious bytecode could make use of this inlining to access or modify memory via an incompatible type.
References (3)
Core 3
Core References
Patch, Third Party Advisory
https://github.com/eclipse-openj9/openj9/pull/16122
Patch, Third Party Advisory
https://github.com/eclipse/omr/pull/6773
Issue Tracking, Vendor Advisory
https://gitlab.eclipse.org/eclipsefdn/emo-team/emo/-/issues/389
Scores
CVSS v3
6.5
EPSS
0.0034
EPSS Percentile
56.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-843
CWE-20
Status
published
Products (1)
eclipse/openj9
< 0.35.0
Published
Oct 24, 2022
Tracked Since
Feb 18, 2026