...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
References
Wiki Markup |
---|
\[[API 06|AA. Java References#API 06]\] [method clone()|http://java.sun.com/javase/6/docs/api/java/lang/Object.html#clone()] \[[Security 06|AA. Java References#Security 06]\] \[[SCG 07|AA. Java References#SCG 07]\] Guideline 2-2 Support copy functionality for a mutable class \[[Bloch 08|AA. Java References#Bloch 08]\] Item 39: Make defensive copies when needed \[[MITRE 09|AA. Java References#MITRE 09]\] [CWE ID 374|http://cwe.mitre.org/data/definitions/374.html] ""Mutable Objects Passed by Reference"", [CWE ID 375|http://cwe.mitre.org/data/definitions/375.html] ""Passing Mutable Objects to an Untrusted Method"" |
...
OBJ35-J. Use checked collections against external code 08. Object Orientation (OBJ) OBJ37-J. Defensively copy private mutable class members before returning their references