Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Additionally, hostile code from any other package can exploit this vulnerability if the class is accessible. (For more information, see the guideline CON04-J. Synchronize using an internal private final lock object.)

...

For more information on using an Object as a lock, see the guideline CON04-J. Synchronize using an internal private final lock object.

...