...
A compliant solution must comply with guideline LCK05-J. Synchronize access to static fields that may can be modified by untrusted code. However, in the untrusted code, the attacker intentionally violates guideline LCK09-J. Do not perform operations that may block while holding a lock.
...