Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

A compliant solution must comply with CON32-J. Internally synchronize classes containing Protect accessible mutable static fields. However, the attacker intentionally violates CON20-J. Do not perform operations that may block while holding a lock in the untrusted code.

...