At 30C3, Ilja van Sprundel gave a talk on X Security. In this talk, he also discussed Qt security matters, specifically how running a setuid
binary which links against Qt is unsafe due to exploitable bugs in the Qt code base (citing the infamous setuid
practice in KPPP). While his points are valid, he misses the greater picture: Qt was not designed for use in setuid
applications! Consequently there are a lot of ways the security of a Qt application can be compromised when it runs as root. So I went on to discuss this issue with QtNetwork maintainer Richard Moore, and we both agree that in contrary to Iljas claim, we do need to dictate policy. So here it goes:
Do not ship Qt applications that require setuid. While the same is probably true for any other toolkit, we have only discussed this for Qt in more depth. Actually, Rich has prepared a patch for Qt 5.3 that will quit if you try to run an application setuid
unless you ask it to. This should make it harder to shoot yourself into the foot.
While making QtCore
and QtNetwork
safe for setuid
use is possible, they currently are not. If you absolutely have to (and you really shouldn’t), at least unset QT_PLUGIN_PATH
and LD_LIBRARY_PATH
in main()
. The latter is required because even though LD_LIBRARY_PATH
is ignored by the linker for setuid
binaries, it is used internally by QtNetwork
unconditionally to look for OpenSSL. Of course, you also need to follow all the other best practices (note that even this list is incomplete, e.g. it doesn’t mention to close FDs).
However, there are also situations where a Qt application running as user can be unsafe, so to those who ship their own Qt build to their customers, there are even more policies:
- Never build Qt so its prefix is a publicly writable directory, such as
/tmp
: Suppose you build a in-source (developer) build in/tmp/qt
, then Qt will go ahead and look for plugins in/tmp/qt/plugins
. A malicious user could simply provide a fake style there that next to calling the style which the user would expect (e.g. via QProxyStyle) executes arbitrary malicious code. The same goes for Image IO plugins, which are handled inQtCore
. - Never build Qt so its prefix is a home directory: This one is more tricky and a lot harder/unlikely to exploit, but it’s a valid attack vector nonetheless: Suppose Joe Coder compiles Qt in-source on
/home/joe/dev/qt
. Now every customer needs to make sure that a local user by the same name is a really nice person.
So in conclusion, a better summary of the above would be:
Never distribute binaries built with a prefix that is a non-system directory!
If you already have this setup, but need a hotfix, there is hope: libQtCore.so contains strings starting in qt_plugpath=
and qt_libspath=
. Both are padded to 1024 bytes. Adding a binary null after the first /
keeps Qt from looking for loadable code in user accessible locations.
TL;DR: The bugs Ilja points out are valid, but only affect applications that don’t follow good practice. We will attempt to make it harder for developers to make these mistakes, but writing suid applications isn’t something that will ever be recommended, or easy to do safely. Apart from the suid issue however, there are more traps lingering if you provide your own Qt and build it in an unsafe way.
Further reading: Google+ discussion on the topic.
Acknowledgements: Richard Moore for contributing vital information to this document, Thiago Macieira for proof-reading.
Update: Clarified the wording to ensure it’s clear that a prefix is meant. Thanks, Ian.
Update 2: As Rich and David Faure pointed out, KPPP is dropping permissions before calling Qt code, and KApplication already has a setuid
safeguard in place.
Update 3: Richs setuid check has been merged.