You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@xalan.apache.org by bu...@apache.org on 2003/07/29 18:53:51 UTC
DO NOT REPLY [Bug 21974] -
Runtime exception from DOM2SAX
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://nagoya.apache.org/bugzilla/show_bug.cgi?id=21974>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND
INSERTED IN THE BUG DATABASE.
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=21974
Runtime exception from DOM2SAX
------- Additional Comments From keshlam@us.ibm.com 2003-07-29 16:53 -------
There are many places where "malicious code" could break Xalan. Checking for all
of them would impose severe performance costs.
Frankly, I consider this a case of "if it hurts when you do that, don't do
that", and am inclined to close it as WONTFIX... or perhaps even INVALID, since
it is not a bug in Xalan but in that other code.