I created upstream bugs to track this: https://bugzilla.mindrot.org/show_bug.cgi?id=3349 https://sourceware.org/bugzilla/show_bug.cgi?id=28377
** Bug watch added: OpenSSH Portable Bugzilla #3349 https://bugzilla.mindrot.org/show_bug.cgi?id=3349 ** Bug watch added: Sourceware.org Bugzilla #28377 https://sourceware.org/bugzilla/show_bug.cgi?id=28377 -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to openssh in Ubuntu. https://bugs.launchpad.net/bugs/1944621 Title: sshd in chroot has regression with glibc 2.34 Status in openssh package in Ubuntu: New Bug description: A regression to sshd running in a chroot exists under the following conditions: 1) sshd was built with glibc 2.34 2) sshd is running with a kernel that does not define the close_range syscall (kernel <= 5.8) 3) /proc/self/fd does not exist in the chroot The glibc 2.34 implementation of fallback_closefrom fails if /proc/self/fd is not present, which is a valid sshd use case. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1944621/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp