[prev in list] [next in list] [prev in thread] [next in thread]
List: busybox
Subject: cut: transforms 0x00 to 0x0a and incorrect length
From: ValdikSS <iam () valdikss ! org ! ru>
Date: 2023-06-15 20:34:42
Message-ID: 477abda2-a068-2197-adf3-1b0a88f0b482 () valdikss ! org ! ru
[Download RAW message or body]
This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
[Attachment #2 (multipart/mixed)]
[Attachment #4 (text/plain)]
Hi there,
Just sending the bug to the mail list in case it got lost in the bug
tracker.
Cut utility incorrectly replaces null-byte (0x00) with \n (0x0a).
Tested with Busybox 1.36.0 and Busybox 1.20.0 ("Busybox in VM" link on
the website).
Busybox:
$ echo -ne "\x00\x01\x02\x03\x04\x05\x06" | ./busybox cut -b 1-3 |
hexdump -C
00000000 0a 01 02 03 0a |.....|
00000005
GNU coreutils:
$ echo -ne "\x00\x01\x02\x03\x04\x05\x06" | cut -b 1-3 | hexdump -C
00000000 00 01 02 0a |....|
00000004
https://bugs.busybox.net/show_bug.cgi?id=15276
["OpenPGP_signature.asc" (application/pgp-signature)]
_______________________________________________
busybox mailing list
busybox@busybox.net
http://lists.busybox.net/mailman/listinfo/busybox
--===============2199614608931075414==--
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic