...
Guideline | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
LCK09-J | low | probable | high | P2 | L3 |
Related Vulnerabilities
C Secure Coding Standard: CON36-C. Do not perform operations that can block while holding a lock
Search for vulnerabilities resulting from the violation of this guideline on the CERT website.
Bibliography
Wiki Markup |
---|
\[[API 2006|AA. Bibliography#API 06]\] Class {{Object}} \[[Grosso 2001|AA. Bibliography#Grosso 01]\] [Chapter 10: Serialization|http://oreilly.com/catalog/javarmi/chapter/ch10.html] \[[JLS 2005|AA. Bibliography#JLS 05]\] [Chapter 17, Threads and Locks|http://java.sun.com/docs/books/jls/third_edition/html/memory.html] \[[Rotem 2008|AA. Bibliography#Rotem 08]\] [Falacies of Distributed Computing Explained|http://www.rgoarchitects.com/Files/fallacies.pdf] |
Related Vulnerabilities
C Secure Coding Standard: CON36-C. Do not perform operations that can block while holding a lock
Search for vulnerabilities resulting from the violation of this guideline on the CERT website.
...
12. Locking (LCK) LCK10-J. Do not use incorrect forms of the double-checked locking idiom