Index: third_party/libxml/chromium/roll.py |
diff --git a/third_party/libxml/chromium/roll.py b/third_party/libxml/chromium/roll.py |
index f4da100b52d8e7c18fd0480855708533bf425b50..44cac5de8ec8b71c01af72f1e0bfbac8776d65dc 100755 |
--- a/third_party/libxml/chromium/roll.py |
+++ b/third_party/libxml/chromium/roll.py |
@@ -75,7 +75,6 @@ PATCHES = [ |
'chromium-issue-620679.patch', |
'chromium-issue-628581.patch', |
'chromium-issue-683629.patch', |
- 'libxml2-2.9.4-security-CVE-2017-7375-xmlParsePEReference-xxe.patch', |
'libxml2-2.9.4-security-CVE-2017-7376-nanohttp-out-of-bounds-write.patch', |
'libxml2-2.9.4-security-xpath-nodetab-uaf.patch', |
'libxml2-2.9.4-xmlDumpElementContent-null-deref.patch', |
@@ -344,8 +343,9 @@ def roll_libxml_linux(src_path, libxml2_repo_path): |
's/Version: .*$/Version: %s/' % commit) |
for patch in PATCHES: |
- subprocess.check_call('cat ../chromium/%s | patch -p1' % patch, |
- shell=True) |
+ subprocess.check_call( |
+ 'cat ../chromium/%s | patch -p1 --fuzz=0' % patch, |
+ shell=True) |
with WorkingDir('../linux'): |
subprocess.check_call( |