...
Guideline | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
LCK10-J | low | probable | medium | P4 | L3 |
Automated Detection
TODO
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this guideline on the CERT website.
Bibliography
Wiki Markup |
---|
\[[API 2006|AA. Bibliography#API 06]\] \[[JLS 2005|AA. Bibliography#JLS 05]\] Section 12.4, "Initialization of Classes and Interfaces" \[[Pugh 2004|AA. Bibliography#Pugh 04]\] \[[Bloch 2001|AA. Bibliography#Bloch 01]\] Item 48: "Synchronize access to shared mutable data" \[[Bloch 2008|AA. Bibliography#Bloch 08]\] Item 71: "Use lazy initialization judiciously" \[[MITRE 2009|AA. Bibliography#MITRE 09]\] [CWE ID 609|http://cwe.mitre.org/data/definitions/609.html] "Double-Checked Locking" |
Automated Detection
TODO
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this guideline on the CERT website.
...
LCK09-J. Do not perform operations that may block while holding a lock 12. Locking (LCK)