
When multiple threads can read or modify the same data, use synchronization techniques to avoid software flaws that can lead to security vulnerabilities. Data races can often result in abnormal termination or denial of service, but it is possible for them to result in more serious vulnerabilities. The C Standard, section 5.1.2.45, paragraph 25 35 [ISO/IEC 9899:20112024], says:
The execution of a program contains a data race if it contains two conflicting actions in different threads, at least one of which is not atomic, and neither happens before the other. Any such data race results in undefined behavior.
...
This compliant solution uses a mutex to make credits and debits atomic operations. All credits and debits will now affect the account balance, so an attacker cannot exploit the race condition to steal money from the bank. The mutex is created with the mtx_init()
function. Note that the The presence of the mutex makes declaring account_balance
volatile
unnecessary.
Code Block | ||||
---|---|---|---|---|
| ||||
#include <threads.h> static int account_balance; static mtx_t account_lock; int debit(int amount) { if (mtx_lock(&account_lock) == thrd_error) { return -1; /* Indicate error to caller */ } account_balance -= amount; if (mtx_unlock(&account_lock) == thrd_error) { return -1; /* Indicate error to caller */ } return 0; /* Indicate success */ } int credit(int amount) { if (mtx_lock(&account_lock) == thrd_error) { return -1; /* Indicate error to caller */ } account_balance += amount; if (mtx_unlock(&account_lock) == thrd_error) { return -1; /* Indicate error to caller */ } return 0; /* Indicate success */ } int main(void) { if(mtx_init(&account_lock, mtx_plain) == thrd_error) { /* Handle error */ } /* ... */ } |
...
This compliant solution uses an atomic variable to synchronize credit and debit operations. All credits and debits will now affect the account balance, so an attacker cannot exploit the race condition to steal money from the bank. The atomic integer does not need to be initialized because default (zero) initialization of an atomic object with static or thread-local storage is guaranteed to produce a valid state. The +=
and -=
operators behave atomically when used with an atomic variable.
Code Block | ||||
---|---|---|---|---|
| ||||
#include <stdatomic.h> atomic_int account_balance; void debit(int amount) { atomic_fetch_sub(&account_balance, -= amount); } void credit(int amount) { atomic_fetch_add(&account_balance, += amount); } |
Noncompliant Code Example (Double-Fetch)
This noncompliant code example illustrates Xen Security Advisory CVE-2015-8550 / XSA-155 In this example, the following code is vulnerable to a data race where the integer referenced by ps
could be modified by a second thread that ran between the two reads of the variable.
...
Race conditions caused by multiple threads concurrently accessing and modifying the same data can lead to abnormal termination and denial-of-service attacks or data integrity violations.
Recommendation | Severity | Likelihood |
---|
Detectable | Repairable | Priority | Level |
---|---|---|---|
CON43-C | Medium | Probable | No |
No | P4 | L3 |
Automated Detection
Tool | Version | Checker | Description | ||||||
---|---|---|---|---|---|---|---|---|---|
Astrée |
| read_data_race write_data_race | Supported by sound analysis (data race alarm) | ||||||
CodeSonar |
| CONCURRENCY.DATARACE CONCURRENCY.MAA | Data race Multiple Accesses of Atomic | ||||||
Coverity |
| MISSING_LOCK (partial) | Implemented | |||||||
Helix QAC |
| C1765, C1766, C1770, C1771 C++1765, C++1766, C++1770, C++1771 | |||||||
Parasoft C/C++test |
| CERT_C-CON43-a | Do not use global variable with different locks set | ||||||
PC-lint Plus |
| 457 | Partially supported: access is detected at the object level (not at the field level) | ||||||
Polyspace Bug Finder |
| CERT C: Rule CON43-C | Checks for data race (rule fully covered) | ||||||
| V1088 |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Related Guidelines
Key here (explains table format and definitions)
Taxonomy | Taxonomy item | Relationship |
---|---|---|
CWE 2.11 |
CWE-366, Race condition within a thread | 2017-07-07: CERT: Exact |
Bibliography
[ISO/IEC 9899: |
2024] | 5.1.2. |
5, "Multi-threaded Executions and Data Races |
7.17.2, "Initialization
" |
[C99 Rationale 2003] |
[Dowd 2006] | Chapter 13, "Synchronization and State" |
[Plum 2012] |
[Seacord 2013] | Chapter 8, "File I/O" |
...
...