Index: content/common/sandbox_linux.h |
diff --git a/content/common/sandbox_linux.h b/content/common/sandbox_linux.h |
index 412c04ab20bdf1915974443370025d853579ed9b..2cf105fadf98b251e3debbbda386dec54c15ad2e 100644 |
--- a/content/common/sandbox_linux.h |
+++ b/content/common/sandbox_linux.h |
@@ -80,6 +80,10 @@ class LinuxSandbox { |
// We must have been pre_initialized_ before using this. |
bool seccomp_bpf_supported() const; |
+ // Returns true if it can be determined that the current process has open |
+ // directories that are not managed by the LinuxSandbox class. This would |
+ // be a vulnerability as it would allow to bypass the setuid sandbox. |
+ bool HasOpenDirectories(); |
// The last part of the initialization is to make sure any temporary "hole" |
// in the sandbox is closed. For now, this consists of closing proc_fd_. |
void SealSandbox(); |