Index: content/common/sandbox_linux/sandbox_linux.cc |
diff --git a/content/common/sandbox_linux/sandbox_linux.cc b/content/common/sandbox_linux/sandbox_linux.cc |
index 1cc21c340f61919073d4ed718b0654af0d9ccfbf..7a048994667e110876a52bf4c449cdd89d326718 100644 |
--- a/content/common/sandbox_linux/sandbox_linux.cc |
+++ b/content/common/sandbox_linux/sandbox_linux.cc |
@@ -140,7 +140,7 @@ void LinuxSandbox::PreinitializeSandbox() { |
#if !defined(NDEBUG) |
// Open proc_fd_ only in Debug mode so that forgetting to close it doesn't |
// produce a sandbox escape in Release mode. |
- proc_fd_ = open("/proc", O_DIRECTORY | O_RDONLY); |
+ proc_fd_ = open("/proc", O_DIRECTORY | O_RDONLY | O_CLOEXEC); |
CHECK_GE(proc_fd_, 0); |
#endif // !defined(NDEBUG) |
// We "pre-warm" the code that detects supports for seccomp BPF. |