I created upstream bugs to track this:

https://bugzilla.mindrot.org/show_bug.cgi?id=3349
https://sourceware.org/bugzilla/show_bug.cgi?id=28377

** Bug watch added: OpenSSH Portable Bugzilla #3349
   https://bugzilla.mindrot.org/show_bug.cgi?id=3349

** Bug watch added: Sourceware.org Bugzilla #28377
   https://sourceware.org/bugzilla/show_bug.cgi?id=28377

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1944621

Title:
  sshd in chroot has regression with glibc 2.34

Status in openssh package in Ubuntu:
  New

Bug description:
  A regression to sshd running in a chroot exists under the following
  conditions:

  1) sshd was built with glibc 2.34
  2) sshd is running with a kernel that does not define the close_range syscall 
(kernel <= 5.8)
  3) /proc/self/fd does not exist in the chroot

  The glibc 2.34 implementation of fallback_closefrom fails if
  /proc/self/fd is not present, which is a valid sshd use case.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1944621/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to