...
Any vulnerabilities resulting from the violation of this rule are listed on the CERT website.
...
Bibliography
Wiki Markup |
---|
\[[JLS 2005|AA. Bibliography#JLS 05]\] [Chapter 17, Threads and Locks|http://java.sun.com/docs/books/jls/third_edition/html/memory.html], Section 17.4.5 Happens-Before Order, Section 17.4.3 Programs and Program Order, Section 17.4.8 Executions and Causality Requirements \[[Bloch 2008|AA. Bibliography#Bloch 08]\] Item 66: Synchronize access to shared mutable data \[[Goetz 2006|AA. Bibliography#Goetz 06]\] 3.4.2. "Example: Using Volatile to Publish Immutable Objects" \[[JPL 2006|AA. Bibliography#JPL 06]\] 14.10.3. "The Happens-Before Relationship" \[[MITRE 2009|AA. Bibliography#MITRE 09]\] [CWE ID 667|http://cwe.mitre.org/data/definitions/667.html] "Insufficient Locking," [CWE ID 413|http://cwe.mitre.org/data/definitions/413.html] "Insufficient Resource Locking," [CWE ID 567|http://cwe.mitre.org/data/definitions/567.html] "Unsynchronized Access to Shared Data" |
...
1211. Locking Visibility and Atomicity (LCKVNA) 1211. Locking Visibility and Atomicity (LCKVNA)