Panic case 4 out of 5!
This and the next panic happens in bytes-1.4.0 crate, which is unhandled and crashes RustDDS.
Specifically, submessages_left.split_to in message.rs is invoked with an insufficient length, causing oob error.
RTPS message (malformed DATA submessge's octetsToNextHeader field):
Real-Time Publish-Subscribe Wire Protocol
Magic: RTPS
Protocol version: 2.2
vendorId: 255.255 (Unknown)
guidPrefix: 010f45d2b3f558b901000000
Default port mapping: domainId=1, participantIdx=0, nature=UNICAST_METATRAFFIC
submessageId: DATA (0x15)
Flags: 0x0b, Serialized Key, Inline QoS, Endianness bit
octetsToNextHeader: 24
[Expert Info (Warning/Protocol): (Error: should be >= 28)]
[(Error: should be >= 28)]
[Severity level: Warning]
[Group: Protocol]
Panic case 4 out of 5! This and the next panic happens in
bytes-1.4.0
crate, which is unhandled and crashes RustDDS. Specifically,submessages_left.split_to
inmessage.rs
is invoked with an insufficient length, causing oob error.RTPS message (malformed DATA submessge's octetsToNextHeader field):
Hexdump of above:
stderr and trace: