| Index: third_party/libxml/chromium/roll.py
|
| diff --git a/third_party/libxml/chromium/roll.py b/third_party/libxml/chromium/roll.py
|
| index f4da100b52d8e7c18fd0480855708533bf425b50..44cac5de8ec8b71c01af72f1e0bfbac8776d65dc 100755
|
| --- a/third_party/libxml/chromium/roll.py
|
| +++ b/third_party/libxml/chromium/roll.py
|
| @@ -75,7 +75,6 @@ PATCHES = [
|
| 'chromium-issue-620679.patch',
|
| 'chromium-issue-628581.patch',
|
| 'chromium-issue-683629.patch',
|
| - 'libxml2-2.9.4-security-CVE-2017-7375-xmlParsePEReference-xxe.patch',
|
| 'libxml2-2.9.4-security-CVE-2017-7376-nanohttp-out-of-bounds-write.patch',
|
| 'libxml2-2.9.4-security-xpath-nodetab-uaf.patch',
|
| 'libxml2-2.9.4-xmlDumpElementContent-null-deref.patch',
|
| @@ -344,8 +343,9 @@ def roll_libxml_linux(src_path, libxml2_repo_path):
|
| 's/Version: .*$/Version: %s/' % commit)
|
|
|
| for patch in PATCHES:
|
| - subprocess.check_call('cat ../chromium/%s | patch -p1' % patch,
|
| - shell=True)
|
| + subprocess.check_call(
|
| + 'cat ../chromium/%s | patch -p1 --fuzz=0' % patch,
|
| + shell=True)
|
|
|
| with WorkingDir('../linux'):
|
| subprocess.check_call(
|
|
|