Buffer overflow from XalanMessageLoader::load() -----------------------------------------------
Key: XALANC-698 URL: https://issues.apache.org/jira/browse/XALANC-698 Project: XalanC Issue Type: Bug Components: XalanC Environment: Probably any C++ Environment Reporter: Scott Colcord One of the XalanMessageLoader::load() overloads is calling XMLString::replaceTokens(), and not properly accounting for the NULL; replaceTokens() requires that the output buffer supplied be able to hold maxChars+1 characters. -- This message is automatically generated by JIRA. - You can reply to this email to add a comment to the issue online. --------------------------------------------------------------------- To unsubscribe, e-mail: xalan-dev-unsubscr...@xml.apache.org For additional commands, e-mail: xalan-dev-h...@xml.apache.org