You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@xalan.apache.org by bu...@apache.org on 2003/07/29 18:53:51 UTC

DO NOT REPLY [Bug 21974] - Runtime exception from DOM2SAX

DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG 
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://nagoya.apache.org/bugzilla/show_bug.cgi?id=21974>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND 
INSERTED IN THE BUG DATABASE.

http://nagoya.apache.org/bugzilla/show_bug.cgi?id=21974

Runtime exception from DOM2SAX





------- Additional Comments From keshlam@us.ibm.com  2003-07-29 16:53 -------
There are many places where "malicious code" could break Xalan. Checking for all 
of them would impose severe performance costs.

Frankly, I consider this a case of "if it hurts when you do that, don't do 
that", and am inclined to close it as WONTFIX... or perhaps even INVALID, since 
it is not a bug in Xalan but in that other code.