diff --git a/openssh-whitelist-syscalls.patch b/openssh-whitelist-syscalls.patch new file mode 100644 index 0000000..edc4183 --- /dev/null +++ b/openssh-whitelist-syscalls.patch @@ -0,0 +1,24 @@ +diff --git a/sandbox-seccomp-filter.c b/sandbox-seccomp-filter.c +index 797a14b..02698cc 100644 +--- a/sandbox-seccomp-filter.c ++++ b/sandbox-seccomp-filter.c +@@ -204,6 +204,9 @@ static const struct sock_filter preauth_insns[] = { + #ifdef __NR_futex + SC_ALLOW(__NR_futex), + #endif ++#ifdef __NR_futex_time64 ++ SC_ALLOW(__NR_futex_time64), ++#endif + #ifdef __NR_geteuid + SC_ALLOW(__NR_geteuid), + #endif +@@ -282,6 +285,9 @@ static const struct sock_filter preauth_insns[] = { + #ifdef __NR_pselect6 + SC_ALLOW(__NR_pselect6), + #endif ++#ifdef __NR_pselect6_time64 ++ SC_ALLOW(__NR_pselect6_time64), ++#endif + #ifdef __NR_read + SC_ALLOW(__NR_read), + #endif diff --git a/openssh.changes b/openssh.changes index 658b297..5bf8be8 100644 --- a/openssh.changes +++ b/openssh.changes @@ -1,3 +1,10 @@ +------------------------------------------------------------------- +Mon Feb 15 10:01:33 UTC 2021 - Hans Petter Jansson + +- Add openssh-whitelist-syscalls.patch (bsc#1182232), fixing + failure to accept connections on 32-bit platforms with + glibc 2.33+. + ------------------------------------------------------------------- Wed Jan 27 14:09:08 UTC 2021 - Thorsten Kukuk diff --git a/openssh.spec b/openssh.spec index 1f68aa5..7f55f4f 100644 --- a/openssh.spec +++ b/openssh.spec @@ -111,6 +111,7 @@ Patch42: openssh-link-with-sk.patch Patch43: openssh-reenable-dh-group14-sha1-default.patch Patch44: openssh-fix-ssh-copy-id.patch Patch45: openssh-8.4p1-ssh_config_d.patch +Patch46: openssh-whitelist-syscalls.patch BuildRequires: audit-devel BuildRequires: automake BuildRequires: groff