Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

L3

Rule

Severity

Likelihood

Remediation Cost

Priority

Level

CON37-J

low

unlikely likely

high

P1

P3

L3

Related Vulnerabilities

Search for vulnerabilities resulting from the violation of this rule on the CERT website.

General recommendations for correct user of locks and synchronization appear in CON00-J. Use synchronization judiciously[].

References

Wiki Markup
\[[Grosso 01|AA. Java References#Grosso 01]\] [Chapter 10: Serialization|http://oreilly.com/catalog/javarmi/chapter/ch10.html]
\[[JLS 05|AA. Java References#JLS 05]\] [Chapter 17, Threads and Locks|http://java.sun.com/docs/books/jls/third_edition/html/memory.html]
\[[Rotem 08|AA. Java References#Rotem 08]\] [Falacies of Distributed Computing Explained|http://www.rgoarchitects.com/Files/fallacies.pdf]

...