Bad arg length for Socket::inet_ntoa, length is 16, should be 4 at /usr/share/perl5/HTTP/Daemon.pm line 51

Bug #1904907 reported by Jeffrey Walton
8
This bug affects 1 person
Affects Status Importance Assigned to Milestone
libhttp-daemon-perl (Debian)
Fix Released
Unknown
libhttp-daemon-perl (Ubuntu)
Fix Released
Undecided
Unassigned

Bug Description

Hi Everyone,

I'm building Wget 1.20.3 from sources on Ubuntu 18.04.5, x86_64, fully patched. Wget is failing 6 self tests. All of the failures are due to a broken Perl. Here is an example:

HTTP request sent, awaiting response... Bad arg length for Socket::inet_ntoa, length is 16, should be 4 at /usr/share/perl5/HTTP/Daemon.pm line 51.
No data received.
Closed 3/SSL 0x0000623000000100
Retrying.

This is apparently a well known problem in HTTP::Daemon. It appears IO::Socket::INET does not support IPv6:

* https://rt.cpan.org/Public/Bug/Display.html?id=71395
* https://rt.cpan.org/Public/Bug/Display.html?id=91699
* https://bugzilla.redhat.com/show_bug.cgi?id=1413065

I filed the report against libhttp-daemon-perl, but that may be wrong. I also see there is a libhttp-daemon-ssl-perl. Other package names include perl-HTTP-Daemon.

Please pick up the fix for "Bad arg length for Socket::inet_ntoa".

---------

$ lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 18.04.5 LTS
Release: 18.04
Codename: bionic

$ apt-cache show libhttp-daemon-perl
Package: libhttp-daemon-perl
Architecture: all
Version: 6.01-1
Priority: optional
Section: perl
Origin: Ubuntu
Maintainer: Ubuntu Developers <email address hidden>
Original-Maintainer: Debian Perl Group <email address hidden>
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
...

$ apt-cache show libhttp-daemon-ssl-perl
Package: libhttp-daemon-ssl-perl
Architecture: all
Version: 1.05-01-1
Priority: extra
Section: universe/perl
Origin: Ubuntu
Maintainer: Ubuntu Developers <email address hidden>
Original-Maintainer: Debian Perl Group <email address hidden>
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
...

Revision history for this message
Jeffrey Walton (noloader) wrote :

It looks like Debian has cleared this problem. Testing on Debian 10.5 does not show the error.

Here is Debian's libhttp-daemon-perl package info:

$ apt-cache show libhttp-daemon-perl
Package: libhttp-daemon-perl
Version: 6.01-3
Installed-Size: 44
Maintainer: Debian Perl Group <email address hidden>
Architecture: all
Replaces: libwww-perl (<< 6.00)
Depends: perl, libhttp-date-perl, libhttp-message-perl, libio-socket-ip-perl, liblwp-mediatypes-perl
Breaks: libhttp-proxy-perl (<< 0.304-4), librpc-xml-perl (<< 0.80-2), libwww-mechanize-perl (<< 1.91-2), libwww-perl (<< 6.00)
...

I don't believe there is anything to report upstream.

Revision history for this message
Jeffrey Walton (noloader) wrote :

This may also be helpful from Red Hat https://access.redhat.com/errata/RHBA-2018:0665:

* BZ - 1413065 - HTTP-Daemon does not support IPv6: Arg length for inet_ntoa
* BZ - 1492760 - IO::Socket::IP->new() fails to listen on unspecified local address

Revision history for this message
Jeffrey Walton (noloader) wrote :

Ping...

Changed in libhttp-daemon-perl (Debian):
status: Unknown → Fix Released
Revision history for this message
TJ (tj) wrote :

Looking at the Debian changelog looks like both Ubuntu 18.04 and 20.04 needs at least 6.01-2 whereas it has 6.01-1. Ubuntu 20.10 has 6.12-1:

libhttp-daemon-perl (6.01-2) unstable; urgency=medium

...
  [ Fabian Grünbichler ]
  * switch to IO::Socket::IP to add IPv6 support (Closes: #667738)

  [ gregor herrmann ]
  * Add (build) dependency on libio-socket-ip-perl.
  * Mark package as autopkgtest-able.
  * Declare compliance with Debian Policy 4.3.0.
  * Bump debhelper compatibility level to 11.
  * Add /me to Uploaders.

 -- gregor herrmann <email address hidden> Thu, 28 Feb 2019 17:45:03 +0100

Revision history for this message
Dimitri John Ledkov (xnox) wrote :

Fix released in focal and up.

Changed in libhttp-daemon-perl (Ubuntu):
status: New → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.