Database ACID characteristic
Database operation provides ACID characteristics.
Atomicity: All operations either occur or fail and are treated as single instructions.
Consistency: Any rules set (cascades, indexes, triggers) are correctly executed.
Isolation: Concurrent behavior shall be the same as sequential behavior.
Durability: Changes are persisted and shall not be lost, even with a DMBS crash.
Caveat:
In the banking scenario, each access (GetBalance, SetNewBalanceToDB) follows ACID, but the database has no knowledge (or control) over the additional logic.
Databases provide notions additional mechanisms to enforce ACID with macro operations.
CWE-362 – Example - Banking
Locks

LockDB();
$transfer_amount = GetTransferAmount();
$balance = GetBalance();
if ($transfer_amount < 0) {
UnLockDB();
FatalError("Bad Transfer Amount");
}
$nb = $balance - $transfer_amount;
if (($balance - $transfer_amount) < 0) {
UnLockDB();
FatalError("Insufficient Funds");
}
SetNewBalanceToDB($nb);
UnLockDB();
NotifyUser("Transfer of $transfer_amount succeeded.");
NotifyUser("New balance: $newbalance");
DB is locked.
No other operations take place.
Transactions

BeginTransaction();
$transfer_amount = GetTransferAmount();
$balance = GetBalance();
if ($transfer_amount < 0) {
EndTransaction();
FatalError("Bad Transfer Amount");
}
$nb = $balance - $transfer_amount;
if (($balance - $transfer_amount) < 0) {
EndTransaction();
FatalError("Insufficient Funds");
}
SetNewBalanceToDB($nb);
CommitTransaction();
NotifyUser("Transfer of $transfer_amount succeeded.");
NotifyUser("New balance: $newbalance");
DB Operations are queued.
Queue is discarded or committed atomically
Versioning
GetVersion();
$transfer_amount = GetTransferAmount();
$balance = GetBalance();
if ($transfer_amount < 0) {
FatalError("Bad Transfer Amount");
}
$nb = $balance - $transfer_amount;
if (($balance - $transfer_amount) < 0) {
FatalError("Insufficient Funds");
}
SetNewBalanceToDB($nb);
Commit();
NotifyUser("Transfer of $transfer_amount succeeded.");
NotifyUser("New balance: $newbalance");
At Commit();
DB version is acquired. Commit may FAIL if another change took place.
Improper Synchronization
// Global
shared_object_t data;
void update_data(char* cookie, pthread_mutex_t * mutex) {
pthread_mutex_lock(mutex);
// Manipulate global data object
pthread_mutex_unlock(mutex);
}
Direct solution:
Protect changes with a mutex.
Developer assumes lock/unlock always work.
CWE-362 – Race Condition – Isolated Ops
X86_64: i++ with gcc
add DWORD PTR [rbp-4], 1
X86_64: i++ with clang
mov edi, dword ptr [rbp - 8]
add edi, 1
mov dword ptr [rbp - 8], edi
ARM: i++
ldr r3, [fp, #-8]
add r3, r3, #1
str r3, [fp, #-8]
Developer thinks: i++
is a single operation.
In reality... it depends, and varies with the architecture.
Still (generic behavior).
Value of “i" must be available (previous logic).
Value must be fetched from RAM to Cache.
Page must be addressed and then loaded.
MMUs and other systems are used.
Value must be fetched from cache to Register.
Register as to be increased.
Result must be stored in Cache.
Result shall be committed to RAM.
CWE-362 - Improper Synchronization
The following function attempts to acquire a lock to perform operations on a shared resource.
The code does not check the value returned by
pthread_mutex_lock()
for errors.If
pthread_mutex_lock()
cannot acquire the mutex for any reason, the function may introduce a race condition into the program and result in undefined behavior.
// Vulnerable
void f(pthread_mutex_t *mutex) {
pthread_mutex_lock(mutex);
/* access shared resource */
pthread_mutex_unlock(mutex);
}
int f(pthread_mutex_t *mutex) {
int result;
result = pthread_mutex_lock(mutex);
if (0 != result)
return result;
/* access shared resource */
return pthread_mutex_unlock(mutex);
}
Last updated