From: Miss Islington (bot) <31488909+miss-islington@users.noreply.github.com> Date: Fri, 26 Sep 2025 12:43:00 +0000 (+0200) Subject: [3.14] gh-127502: Fix typo in XML security notes (GH-139335) (#139346) X-Git-Tag: v3.14.0~42 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=f2b82b3b3b1f8c7a81e84df35ee921e44517cf32;p=thirdparty%2FPython%2Fcpython.git [3.14] gh-127502: Fix typo in XML security notes (GH-139335) (#139346) gh-127502: Fix typo in XML security notes (GH-139335) (cherry picked from commit 6fa1e552e06063b668e02540ba1c31a4d87bbb17) Co-authored-by: Sebastian Pipping --- diff --git a/Doc/library/xml.rst b/Doc/library/xml.rst index 28465219a1ac..3f7455734744 100644 --- a/Doc/library/xml.rst +++ b/Doc/library/xml.rst @@ -55,7 +55,7 @@ An attacker can abuse XML features to carry out denial of service attacks, access local files, generate network connections to other machines, or circumvent firewalls. -Expat versions lower that 2.6.0 may be vulnerable to "billion laughs", +Expat versions lower than 2.6.0 may be vulnerable to "billion laughs", "quadratic blowup" and "large tokens". Python may be vulnerable if it uses such older versions of Expat as a system-provided library. Check :const:`!pyexpat.EXPAT_VERSION`.