This new behavior is enforced by /proc/sys/fs/protected_regular, a new
sysctl introduced by commit 30aba6656f61ed44cba445a3c0d38b296fa9e8f5
("namei: allow restricted O_CREAT of FIFOs and regular files").

The default behavior is to make data spoofing attacks harder,
disallowing the open of files not owned by the user in world writable
sticky directory (unless the user perfectly matches the owner).
Unfortunately this setting is system-wide and it's not per-filesystem.

You can restore the previous behavior system-wide by running:

 $ sudo sysctl fs.protected_regular=0

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1887727

Title:
  Permission denied opening file in a directory with a sticky bit

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/zfs-linux/+bug/1887727/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to