- From: <bugzilla@jessica.w3.org>
- Date: Tue, 22 Oct 2013 12:05:47 +0000
- To: public-html-admin@w3.org
https://www.w3.org/Bugs/Public/show_bug.cgi?id=23593 Bug ID: 23593 Summary: New restriction for safe CDATA content in script elements: the string <script> needs to be escaped. Product: HTML WG Version: unspecified Hardware: PC OS: Windows NT Status: NEW Severity: normal Priority: P3 Component: HTML/XHTML Compatibility Authoring Guide (ed: Eliot Graff) Assignee: xn--mlform-iua@xn--mlform-iua.no Reporter: xn--mlform-iua@xn--mlform-iua.no QA Contact: public-html-bugzilla@w3.org CC: eliotgra@microsoft.com, mike@w3.org, public-html-admin@w3.org, public-html-wg-issue-tracking@w3.org, qbolec@gmail.com, robin@w3.org, xn--mlform-iua@xn--mlform-iua.no Depends on: 23587 See comment number 1 in Bug #23587. Polyglot Markup describes ”safe CDATA content”, which is a description of the content that can be safely inserted into a script or style element provided that it is wrapped inside a CDATA declaration. Simply put, that content has to match what the parser rules for the text/html serialization. However, Jakub Łopuszański’s bug, bug #23587, shows that we also need to say something about escaping the <script> start tag, if it occurs inside a comment inside the script element - see comment number 1 of Bug #23587. -- You are receiving this mail because: You are on the CC list for the bug.
Received on Tuesday, 22 October 2013 12:05:49 UTC