Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Any vulnerabilities resulting from the violation of this rule are listed on the CERT website.

Related Guidelines

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="6c7a417b-464d-4407-806c-0297ca9703c9"><ac:plain-text-body><![CDATA[

[[MITRE 2009

AA. Bibliography#MITRE 09]]

[CWE-820

http://cwe.mitre.org/data/definitions/412.html] "Missing Synchronization"

]]></ac:plain-text-body></ac:structured-macro>

Bibliography

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="112e29d88212a0aa-85ee2629-4f5344cd-b8f5a3fc-38ae840465e1d8b99dc1218c"><ac:plain-text-body><![CDATA[

[[API 2006

AA. Bibliography#API 06]]

 

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="8d05f27686decc7a-570ebf79-47f54335-991286d0-98c9874180b0c16270ddb411"><ac:plain-text-body><![CDATA[

[[Bloch 2008

AA. Bibliography#Bloch 08]]

Item 67: "Avoid excessive synchronization"

]]></ac:plain-text-body></ac:structured-macro>

...