This new behavior is enforced by /proc/sys/fs/protected_regular, a new sysctl introduced by commit 30aba6656f61ed44cba445a3c0d38b296fa9e8f5 ("namei: allow restricted O_CREAT of FIFOs and regular files").
The default behavior is to make data spoofing attacks harder, disallowing the open of files not owned by the user in world writable sticky directory (unless the user perfectly matches the owner). Unfortunately this setting is system-wide and it's not per-filesystem. You can restore the previous behavior system-wide by running: $ sudo sysctl fs.protected_regular=0 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1887727 Title: Permission denied opening file in a directory with a sticky bit To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/zfs-linux/+bug/1887727/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs