[prev in list] [next in list] [prev in thread] [next in thread] 

List:       busybox
Subject:    cut: transforms 0x00 to 0x0a and incorrect length
From:       ValdikSS <iam () valdikss ! org ! ru>
Date:       2023-06-15 20:34:42
Message-ID: 477abda2-a068-2197-adf3-1b0a88f0b482 () valdikss ! org ! ru
[Download RAW message or body]

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
[Attachment #2 (multipart/mixed)]

[Attachment #4 (text/plain)]

Hi there,

Just sending the bug to the mail list in case it got lost in the bug 
tracker.

Cut utility incorrectly replaces null-byte (0x00) with \n (0x0a).

Tested with Busybox 1.36.0 and Busybox 1.20.0 ("Busybox in VM" link on 
the website).

Busybox:
$ echo -ne "\x00\x01\x02\x03\x04\x05\x06" | ./busybox cut -b 1-3 | 
hexdump -C
00000000  0a 01 02 03 0a                                    |.....|
00000005

GNU coreutils:
$ echo -ne "\x00\x01\x02\x03\x04\x05\x06" | cut -b 1-3 | hexdump -C
00000000  00 01 02 0a                                       |....|
00000004

https://bugs.busybox.net/show_bug.cgi?id=15276

["OpenPGP_signature.asc" (application/pgp-signature)]

_______________________________________________
busybox mailing list
busybox@busybox.net
http://lists.busybox.net/mailman/listinfo/busybox

--===============2199614608931075414==--

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic