This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Code Correctness: Call to Thread.run()"

From OWASP
Jump to: navigation, search
Line 27: Line 27:
  
 
==Related Attacks==
 
==Related Attacks==
 
[[:Category:API Abuse Attack]]
 
  
 
==Related Vulnerabilities==
 
==Related Vulnerabilities==
Line 44: Line 42:
 
[[Category:Synchronization and Timing Vulnerability]]
 
[[Category:Synchronization and Timing Vulnerability]]
  
[[Category:Use of Dangerous API]]
+
[[Category:API Abuse]]

Revision as of 18:27, 18 July 2006

This article includes content generously donated to OWASP by MicroFocus Logo.png

This is a Vulnerability. To view all vulnerabilities, please see the Vulnerability Category page.


Abstract

The program calls a thread's run() method instead of calling start().

Description

In most cases a direct call to a Thread object's run() method is a bug. The programmer intended to begin a new thread of control, but accidentally called run() instead of start(), so the run() method will execute in the caller's thread of control.

Examples

The following excerpt from a Java program mistakenly calls run() instead of start().

   Thread thr = new Thread() {
     public void run() {
       ...
     } 
   };
   thr.run();

Examples

Related Threats

Related Attacks

Related Vulnerabilities

Related Countermeasures

Categories