Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Guideline

Severity

Likelihood

Remediation Cost

Priority

Level

LCK10-J

low

probable

medium

P4

L3

Automated Detection

TODO

Related Vulnerabilities

Search for vulnerabilities resulting from the violation of this guideline on the CERT website.

Bibliography

Wiki Markup
\[[API 2006|AA. Bibliography#API 06]\]
\[[JLS 2005|AA. Bibliography#JLS 05]\] Section 12.4, "Initialization of Classes and Interfaces"
\[[Pugh 2004|AA. Bibliography#Pugh 04]\]
\[[Bloch 2001|AA. Bibliography#Bloch 01]\] Item 48: "Synchronize access to shared mutable data"
\[[Bloch 2008|AA. Bibliography#Bloch 08]\] Item 71: "Use lazy initialization judiciously"
\[[MITRE 2009|AA. Bibliography#MITRE 09]\] [CWE ID 609|http://cwe.mitre.org/data/definitions/609.html] "Double-Checked Locking"

Automated Detection

TODO

Related Vulnerabilities

Search for vulnerabilities resulting from the violation of this guideline on the CERT website.

...

LCK09-J. Do not perform operations that may block while holding a lock      12. Locking (LCK)