Back to the previous page
Test Case ID | ![]() |
Bad / Good / Mixed | Bad![]() |
Author | IARPA STONESOUP Test and Evaluation team |
Associations | Test suite: 102 Application: 11 |
Added by | Charles Oliveira |
Language | Java |
Type of test case | Source Code |
Input string | |
Expected Output | |
Instructions | See src/build.xml and src/maven-build.xml. |
Submission date | 2015-10-06 |
Description | This weakness takes a string in the form: '<qsize> <data>' where qsize is the size of the array to sort (used to delay execution) and data is a string that is used for processing. The contents of this string are unimportant. Two threads are created, one of which fails to check for a mutex lock leading to a null pointer dereference. In order to hit the weakness qsize >= 5000000, benign values should use qsize <= 50. Metadata - Base program: Apache Jena - Source Taint: FILE_CONTENTS - Data Type: SIMPLE - Data Flow: ADDRESS_AS_CONSTANT - Control Flow: INTERCLASS_2 |
File(s) |
|
Flaw |
There are no comments
Have any comments on this test case? Please,
.
- ResolvedRelativeIRI.java
- runFifos.py
- service_mon.sh
- J-C414A-JENA-02-ST02-DT02-DF05-CF05-01.yaml
- J-C414A-JENA-02-ST02-DT02-DF05-CF05-01.xml
File Contains:
CWE-414: Missing Lock Check on line(s): 510, 511, 512
CWE-414: Missing Lock Check on line(s): 510, 511, 512