DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT <http://nagoya.apache.org/bugzilla/show_bug.cgi?id=27081>. ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND INSERTED IN THE BUG DATABASE.
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=27081 Too much malformed data is reported ------- Additional Comments From [EMAIL PROTECTED] 2004-02-21 02:54 ------- I've succeeded in reporducing the bug without any dependence on XOM; i.e. in a pure SAX program. The revised test case is attached. It seems necessary only that 026.xml be processed before the bug exposes itself. It's not necessary to process 1-25 with the same parser, but it is necessary to process 026.xml. I don't yet know whether it's something special about 026.xml or whether any malformed file or any XML document at all would be able to expose the bug. However, the bug does not appear when 027.xml is the first document parsed by the XMLReader. --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]
