Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 251311 Details for
Bug 370951
Software Updater Thowing Exception
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
Exception
yumbug (text/plain), 21.65 KB, created by
Adrian Revill
on 2007-11-08 09:32:03 UTC
(
hide
)
Description:
Exception
Filename:
MIME Type:
Creator:
Adrian Revill
Created:
2007-11-08 09:32:03 UTC
Size:
21.65 KB
patch
obsolete
>Component: Software Updater >Summary: TB9536d0ca <string>:64:__iter__:SyntaxError: mismatched tag: line 242, column 8 > >Traceback (most recent call last): > File "/usr/sbin/pup", line 668, in ? > main() > File "/usr/sbin/pup", line 664, in main > pup.run() > File "/usr/sbin/pup", line 499, in run > self.doRefresh() > File "/usr/sbin/pup", line 324, in doRefresh > self.populateUpdates() > File "/usr/sbin/pup", line 380, in populateUpdates > self.updateMetadata.add(repo) > File "/usr/lib/python2.4/site-packages/yum/update_md.py", line 235, in add > for event, elem in iterparse(infile): > File "<string>", line 64, in __iter__ >SyntaxError: mismatched tag: line 242, column 8 > >Local variables in innermost frame: >p: <XMLParser object at 0x1b532450> >self: <iterparse object at 0x1b89ff90> >b: <TreeBuilder object at 0x1b6b8a58> >data: <?xml version="1.0" encoding="UTF-8"?> ><updates> > <update from="security@redhat.com" status="final" type="bugfix" version="4"> > <id>RHBA-2007:0112-4</id> > <title>RHBA-2007:0112</title> > <issued date="2007-03-13 00:00:00"/> > <updated date="2007-03-14 00:00:00"/> > <description>virt-manager bug fix update > >Virtual Machine Manager provides a graphical tool for administering virtual >machines such as Xen. It uses libvirt as the backend management API. > >Due to limitations in the virtual mouse drivers, the virtual console window >for Xen guest domains shows two cursors which do not line up. After this >update the mouse pointer will automatically be confined to the virtual >console window upon first mouse click. The local cursor will also be hidden >so that only the virtual guest cursor is visible. > >Users are advised to upgrade to this updated virt-manager package, which >resolves this issue.</description> > <references> > <reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=223805" id="223805" type="bugzilla"> > Mouse pointer unusable in the graphical console > </reference> > </references> > <pkglist> > <collection short="rhel-x86_64-server-vt-5"> > <name>RHEL Virtualization (v. 5 for 64-bit x86_64)</name> > <package name="virt-manager" version="0.2.6" release="7.0.2.el5" epoch="0" arch="i386" src="virt-manager-0.2.6-7.0.2.el5.src.rpm"> > <filename>virt-manager-0.2.6-7.0.2.el5.i386.rpm</filename> > <sum type="md5">9e3510631dc751f78e3f17711d7c2669</sum> > </package> > <package name="virt-manager" version="0.2.6" release="7.0.2.el5" epoch="0" arch="x86_64" src="virt-manager-0.2.6-7.0.2.el5.src.rpm"> > <filename>virt-manager-0.2.6-7.0.2.el5.x86_64.rpm</filename> > <sum type="md5">74a22a308fd824c77c26a003dc2b1dd8</sum> > </package> > <package name="virt-manager" version="0.2.6" release="7.0.2.el5" epoch="0" arch="ia64" src="virt-manager-0.2.6-7.0.2.el5.src.rpm"> > <filename>virt-manager-0.2.6-7.0.2.el5.ia64.rpm</filename> > <sum type="md5">be8bbd5893feececa74d4901dd1c2cd2</sum> > </package> > </collection> > </pkglist> > </update> <update from="security@redhat.com" status="final" type="security" version="5"> > <id>RHSA-2007:0114-5</id> > <title>RHSA-2007:0114</title> > <issued date="2007-03-14 00:00:00"/> > <updated date="2007-03-14 00:00:00"/> > <description>Important: xen security update > >The Xen package contains the tools for managing the virtual machine monitor >in Red Hat Enterprise Linux virtualization. > >A flaw was found affecting the VNC server code in QEMU. On a >fullyvirtualized guest VM, where qemu monitor mode is enabled, a user who >had access to the VNC server could gain the ability to read arbitrary files >as root in the host filesystem. (CVE-2007-0998) > >In addition to disabling qemu monitor mode, the following bugs were also fixed: > >* Fix IA64 fully virtualized (VTi) shadow page table mode initialization. > >* Fix network bonding in balanced-rr mode. Without this update, a network >path loss could result in packet loss. > >Users of Xen should update to these erratum packages containing backported >patches which correct these issues.</description> > <references> > <reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0998" id="CVE-2007-0998" type="cve"> > </reference> > <reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=230295" id="230295" type="bugzilla"> > CVE-2007-0998 HVM guest VNC server allows compromise of entire host OS by any VNC console user > </reference> > </references> > <pkglist> > <collection short="rhel-x86_64-server-vt-5"> > <name>RHEL Virtualization (v. 5 for 64-bit x86_64)</name> > <package name="xen-devel" version="3.0.3" release="25.0.3.el5" epoch="0" arch="i386" src="xen-3.0.3-25.0.3.el5.src.rpm"> > <filename>xen-devel-3.0.3-25.0.3.el5.i386.rpm</filename> > <sum type="md5">160836bd41a0d666fd7a6289f718c741</sum> > </package> > <package name="xen-libs" version="3.0.3" release="25.0.3.el5" epoch="0" arch="i386" src="xen-3.0.3-25.0.3.el5.src.rpm"> > <filename>xen-libs-3.0.3-25.0.3.el5.i386.rpm</filename> > <sum type="md5">92f7eabd5a9a6f918d83141eb71c7593</sum> > </package> > <package name="xen" version="3.0.3" release="25.0.3.el5" epoch="0" arch="x86_64" src="xen-3.0.3-25.0.3.el5.src.rpm"> > <filename>xen-3.0.3-25.0.3.el5.x86_64.rpm</filename> > <sum type="md5">2d5a582377d3874bb25fcc75615cb27a</sum> > </package> > <package name="xen-libs" version="3.0.3" release="25.0.3.el5" epoch="0" arch="x86_64" src="xen-3.0.3-25.0.3.el5.src.rpm"> > <filename>xen-libs-3.0.3-25.0.3.el5.x86_64.rpm</filename> > <sum type="md5">c460c527934aa3270aa425c5dd15ca66</sum> > </package> > <package name="xen" version="3.0.3" release="25.0.3.el5" epoch="0" arch="ia64" src="xen-3.0.3-25.0.3.el5.src.rpm"> > <filename>xen-3.0.3-25.0.3.el5.ia64.rpm</filename> > <sum type="md5">b9e42bf5e3afbd84b2e15b1aab7f502d</sum> > </package> > <package name="xen-devel" version="3.0.3" release="25.0.3.el5" epoch="0" arch="x86_64" src="xen-3.0.3-25.0.3.el5.src.rpm"> > <filename>xen-devel-3.0.3-25.0.3.el5.x86_64.rpm</filename> > <sum type="md5">2bac7c8ac7e7748385712eaf3755beaf</sum> > </package> > <package name="xen" version="3.0.3" release="25.0.3.el5" epoch="0" arch="i386" src="xen-3.0.3-25.0.3.el5.src.rpm"> > <filename>xen-3.0.3-25.0.3.el5.i386.rpm</filename> > <sum type="md5">572e398fbc504adaae182b3ba040920f</sum> > </package> > <package name="xen-devel" version="3.0.3" release="25.0.3.el5" epoch="0" arch="ia64" src="xen-3.0.3-25.0.3.el5.src.rpm"> > <filename>xen-devel-3.0.3-25.0.3.el5.ia64.rpm</filename> > <sum type="md5">b36f6d2d4c0c8df85085ce10ba0e854f</sum> > </package> > <package name="xen-libs" version="3.0.3" release="25.0.3.el5" epoch="0" arch="ia64" src="xen-3.0.3-25.0.3.el5.src.rpm"> > <filename>xen-libs-3.0.3-25.0.3.el5.ia64.rpm</filename> > <sum type="md5">b18a6c8850c5a5253d96b02aab29cb7d</sum> > </package> > </collection> > </pkglist> > </update> <update from="security@redhat.com" status="final" type="security" version="2"> > <id>RHSA-2007:0323-2</id> > <title>RHSA-2007:0323</title> > <issued date="2007-10-02 00:00:00"/> > <updated date="2007-10-02 00:00:00"/> > <description>Important: xen security update > >The Xen package contains the tools for managing the virtual machine monitor >in Red Hat Enterprise Linux virtualization. > >The following security flaws are fixed in the updated Xen package: > >Joris van Rantwijk found a flaw in the Pygrub utility which is used as a >boot loader for guest domains. A malicious local administrator of a guest >domain could create a carefully crafted grub.conf file which would trigger >the execution of arbitrary code outside of that domain. (CVE-2007-4993) > >Tavis Ormandy discovered a heap overflow flaw during video-to-video copy >operations in the Cirrus VGA extension code used in Xen. A malicious local >administrator of a guest domain could potentially trigger this flaw and >execute arbitrary code outside of the domain. (CVE-2007-1320) > >Tavis Ormandy discovered insufficient input validation leading to a heap >overflow in the Xen NE2000 network driver. If the driver is in use, a >malicious local administrator of a guest domain could potentially trigger >this flaw and execute arbitrary code outside of the domain. Xen does not >use this driver by default. (CVE-2007-1321) > >Users of Xen should update to these erratum packages containing backported >patches which correct these issues.</description> > <references> > <reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4993" id="CVE-2007-4993" type="cve"> > </reference> > <reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1320" id="CVE-2007-1320" type="cve"> > </reference> > <reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1321" id="CVE-2007-1321" type="cve"> > </reference> > <reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=237342" id="237342" type="bugzilla"> > CVE-2007-1320 xen Cirrus LGD-54XX "bitblt" Heap Overflow > </reference> > <reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=237343" id="237343" type="bugzilla"> > CVE-2007-1321 xen QEMU NE2000 emulation issues > </reference> > <reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=302801" id="302801" type="bugzilla"> > CVE-2007-4993 xen guest root can escape to domain 0 through pygrub > </reference> > </references> > <pkglist> > <collection short="rhel-x86_64-server-vt-5"> > <name>RHEL Virtualization (v. 5 for 64-bit x86_64)</name> > <package name="xen-libs" version="3.0.3" release="25.0.4.el5" epoch="0" arch="x86_64" src="xen-3.0.3-25.0.4.el5.src.rpm"> > <filename>xen-libs-3.0.3-25.0.4.el5.x86_64.rpm</filename> > <sum type="md5">8869650a19cb4001e7aa1d1fa1dc562f</sum> > </package> > <package name="xen-libs" version="3.0.3" release="25.0.4.el5" epoch="0" arch="i386" src="xen-3.0.3-25.0.4.el5.src.rpm"> > <filename>xen-libs-3.0.3-25.0.4.el5.i386.rpm</filename> > <sum type="md5">e4dca4285b1c8fd877527ec278e9d835</sum> > </package> > <package name="xen" version="3.0.3" release="25.0.4.el5" epoch="0" arch="ia64" src="xen-3.0.3-25.0.4.el5.src.rpm"> > <filename>xen-3.0.3-25.0.4.el5.ia64.rpm</filename> > <sum type="md5">aae6a104ac9d96a2258083a2037091e7</sum> > </package> > <package name="xen" version="3.0.3" release="25.0.4.el5" epoch="0" arch="i386" src="xen-3.0.3-25.0.4.el5.src.rpm"> > <filename>xen-3.0.3-25.0.4.el5.i386.rpm</filename> > <sum type="md5">f41141cc620e161fedd68456d91c0103</sum> > </package> > <package name="xen-devel" version="3.0.3" release="25.0.4.el5" epoch="0" arch="i386" src="xen-3.0.3-25.0.4.el5.src.rpm"> > <filename>xen-devel-3.0.3-25.0.4.el5.i386.rpm</filename> > <sum type="md5">29bcc93687b19f3388db33fbc7967466</sum> > </package> > <package name="xen-libs" version="3.0.3" release="25.0.4.el5" epoch="0" arch="ia64" src="xen-3.0.3-25.0.4.el5.src.rpm"> > <filename>xen-libs-3.0.3-25.0.4.el5.ia64.rpm</filename> > <sum type="md5">09a0ab57a37644e796eb9d13efac90cb</sum> > </package> > <package name="xen" version="3.0.3" release="25.0.4.el5" epoch="0" arch="x86_64" src="xen-3.0.3-25.0.4.el5.src.rpm"> > <filename>xen-3.0.3-25.0.4.el5.x86_64.rpm</filename> > <sum type="md5">8821c1ad48035acc660ec5b1df3a1cb1</sum> > </package> > <package name="xen-devel" version="3.0.3" release="25.0.4.el5" epoch="0" arch="x86_64" src="xen-3.0.3-25.0.4.el5.src.rpm"> > <filename>xen-devel-3.0.3-25.0.4.el5.x86_64.rpm</filename> > <sum type="md5">29ef0e6e5097bd82e44d8492bb8cfe5f</sum> > </package> > <package name="xen-devel" version="3.0.3" release="25.0.4.el5" epoch="0" arch="ia64" src="xen-3.0.3-25.0.4.el5.src.rpm"> > <filename>xen-devel-3.0.3-25.0.4.el5.ia64.rpm</filename> > <sum type="md5">fbf21cbabba81747c23c9462a88e934b</sum> > </package> > </collection> > </pkglist> > </update> <update from="security@redhat.com" status="final" type="enhancement" version="8"> > <id>RHEA-2007:0643-8</id> > <title>RHEA-2007:0643</title> > <issued date="2007-11-07 09:35:25"/> > <updated date="2007-11-07 09:35:25"/> > <description>libvirt enhancement update > >Libvirt is a C toolkit to interact with the virtualization capabilities of >recent versions of Linux and other operating systems. > >The Xen hypervisor has been updated to Xen 3.1, which is not ABI compatible >with the earlier Xen 3.0.3 hypervisor. The new libvirt has support for >dealing with the new Xen 3.1 hypervisor ABI format. The libvirt update also >provides improved support for management of inactive virtual machines, and >a NAT based networking model. > >All users of libvirt are advised to upgrade to these updated packages, >which contain these enhancements.</description> > <references> > <reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=234840" id="234840" type="bugzilla"> > Add a virsh block-attach/block-detach command > </reference> > <reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=243463" id="243463" type="bugzilla"> > Update to libvirt 0.2.3 to support new Xen 3.1.0 hypervisor > </reference> > <reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=250146" id="250146" type="bugzilla"> > memory leak: virConnectClose() doesn't free all the memory it should > </reference> > <reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=250789" id="250789" type="bugzilla"> > New style PVFB config not processed correctly when starting guests with libvirt > </reference> > <reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=251594" id="251594" type="bugzilla"> > Driver for /etc/xen config files does not correctly handle virtual networks > </reference> > <reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=253013" id="253013" type="bugzilla"> > "virsh console" should be documented in virsh man page > </reference> > <reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=254188" id="254188" type="bugzilla"> > virt-install writes vncdisplay=<vncport> in domain config > </reference> > </references> > <pkglist> > <collection short="rhel-x86_64-server-vt-5"> > <name>RHEL Virtualization (v. 5 for 64-bit x86_64)</name> > <package name="libvirt-python" version="0.2.3" release="9.el5" epoch="0" arch="x86_64" src="libvirt-0.2.3-9.el5.src.rpm"> > <filename>libvirt-python-0.2.3-9.el5.x86_64.rpm</filename> > <sum type="md5">2ba2a1e5f0101cd208b7bb25135c20f2</sum> > </package> > <package name="libvirt-devel" version="0.2.3" release="9.el5" epoch="0" arch="i386" src="libvirt-0.2.3-9.el5.src.rpm"> > <filename>libvirt-devel-0.2.3-9.el5.i386.rpm</filename> > <sum type="md5">af4f983309d3586953e23ab0f9f89382</sum> > </package> > <package name="libvirt" version="0.2.3" release="9.el5" epoch="0" arch="i386" src="libvirt-0.2.3-9.el5.src.rpm"> > <filename>libvirt-0.2.3-9.el5.i386.rpm</filename> > <sum type="md5">86c7288f3b9fad826740a4001b5a7069</sum> > </package> > <package name="libvirt-python" version="0.2.3" release="9.el5" epoch="0" arch="i386" src="libvirt-0.2.3-9.el5.src.rpm"> > <filename>libvirt-python-0.2.3-9.el5.i386.rpm</filename> > <sum type="md5">cf136f26cb7c84e15457891685ceddd7</sum> > </package> > <package name="libvirt-devel" version="0.2.3" release="9.el5" epoch="0" arch="x86_64" src="libvirt-0.2.3-9.el5.src.rpm"> > <filename>libvirt-devel-0.2.3-9.el5.x86_64.rpm</filename> > <sum type="md5">c2e089ac37da878170ebfb0f179f1cba</sum> > </package> > <package name="libvirt" version="0.2.3" release="9.el5" epoch="0" arch="x86_64" src="libvirt-0.2.3-9.el5.src.rpm"> > <filename>libvirt-0.2.3-9.el5.x86_64.rpm</filename> > <sum type="md5">576e4680c51117fc9cf2f9af9e7ffd19</sum> > </package> > <package name="libvirt-devel" version="0.2.3" release="9.el5" epoch="0" arch="ia64" src="libvirt-0.2.3-9.el5.src.rpm"> > <filename>libvirt-devel-0.2.3-9.el5.ia64.rpm</filename> > <sum type="md5">8ed3a4d24e3b13bab42a1f18c53bbe37</sum> > </package> > <package name="libvirt-python" version="0.2.3" release="9.el5" epoch="0" arch="ia64" src="libvirt-0.2.3-9.el5.src.rpm"> > <filename>libvirt-python-0.2.3-9.el5.ia64. >events: [('end', <Element 'id' at 0x1b9fb930>), ('end', <Element 'title' at 0x1b9fb9c0>), ('end', <Element 'issued' at 0x1b9fbe10>), ('end', <Element 'updated' at 0x1b9fbcc0>), ('end', <Element 'description' at 0x1b9fbcf0>), ('end', <Element 'reference' at 0x1b9fb9f0>), ('end', <Element 'references' at 0x1b9fbc30>), ('end', <Element 'name' at 0x1b9fb6f0>), ('end', <Element 'filename' at 0x1b9fb450>), ('end', <Element 'sum' at 0x1b9fb2d0>), ('end', <Element 'package' at 0x1b9fb420>), ('end', <Element 'filename' at 0x1b9fb210>), ('end', <Element 'sum' at 0x1b9fb1b0>), ('end', <Element 'package' at 0x1b9fb2a0>), ('end', <Element 'filename' at 0x1b9fb060>), ('end', <Element 'sum' at 0x1b9f3f30>), ('end', <Element 'package' at 0x1b9fb090>), ('end', <Element 'collection' at 0x1b9fb7e0>), ('end', <Element 'pkglist' at 0x1b9fb8d0>), ('end', <Element 'update' at 0x1b9ff0c0>), ('end', <Element 'id' at 0x1b9f3b40>), ('end', <Element 'title' at 0x1b9f3b70>), ('end', <Element 'issued' at 0x1b9f3a80>), ('end', <Element 'updated' at 0x1b9f38a0>), ('end', <Element 'description' at 0x1b9f38d0>), ('end', <Element 'reference' at 0x1b9f36f0>), ('end', <Element 'reference' at 0x1b9f3420>), ('end', <Element 'references' at 0x1b9f3810>), ('end', <Element 'name' at 0x1b9f31e0>), ('end', <Element 'filename' at 0x1b9ef540>), ('end', <Element 'sum' at 0x1b9ef810>), ('end', <Element 'package' at 0x1b9f30c0>), ('end', <Element 'filename' at 0x1b9effc0>), ('end', <Element 'sum' at 0x1b9efe10>), ('end', <Element 'package' at 0x1b9eff30>), ('end', <Element 'filename' at 0x1b9efd20>), ('end', <Element 'sum' at 0x1b9efc30>), ('end', <Element 'package' at 0x1b9efd80>), ('end', <Element 'filename' at 0x1b9ef960>), ('end', <Element 'sum' at 0x1b9ef990>), ('end', <Element 'package' at 0x1b9efab0>), ('end', <Element 'filename' at 0x1b9ef720>), ('end', <Element 'sum' at 0x1b9ef6c0>), ('end', <Element 'package' at 0x1b9ef7b0>), ('end', <Element 'filename' at 0x1b9ef600>), ('end', <Element 'sum' at 0x1b9ef5a0>), ('end', <Element 'package' at 0x1b9ef690>), ('end', <Element 'filename' at 0x1b9ef360>), ('end', <Element 'sum' at 0x1b9ef3f0>), ('end', <Element 'package' at 0x1b9ef450>), ('end', <Element 'filename' at 0x1b9ef270>), ('end', <Element 'sum' at 0x1b9ef1b0>), ('end', <Element 'package' at 0x1b9ef2d0>), ('end', <Element 'filename' at 0x1b9ec9c0>), ('end', <Element 'sum' at 0x1b9ecd80>), ('end', <Element 'package' at 0x1b9ec990>), ('end', <Element 'collection' at 0x1b9f31b0>), ('end', <Element 'pkglist' at 0x1b9f3390>), ('end', <Element 'update' at 0x1b9f3d20>), ('end', <Element 'id' at 0x1b9ecd20>), ('end', <Element 'title' at 0x1b9ecc90>), ('end', <Element 'issued' at 0x1b9eccc0>), ('end', <Element 'updated' at 0x1b9ecba0>), ('end', <Element 'description' at 0x1b9ecb40>), ('end', <Element 'reference' at 0x1b9ec9f0>), ('end', <Element 'reference' at 0x1b9ec8a0>), ('end', <Element 'reference' at 0x1b9ec7e0>), ('end', <Element 'reference' at 0x1b9ec5a0>), ('end', <Element 'reference' at 0x1b9ec2d0>), ('end', <Element 'reference' at 0x1b9ec1e0>), ('end', <Element 'references' at 0x1b9ecae0>), ('end', <Element 'name' at 0x1b9e8930>), ('end', <Element 'filename' at 0x1b9e8db0>), ('end', <Element 'sum' at 0x1b9e8de0>), ('end', <Element 'package' at 0x1b9e8f00>), ('end', <Element 'filename' at 0x1b9e8c00>), ('end', <Element 'sum' at 0x1b9e8a20>), ('end', <Element 'package' at 0x1b9e8b70>), ('end', <Element 'filename' at 0x1b9e88a0>), ('end', <Element 'sum' at 0x1b9e8810>), ('end', <Element 'package' at 0x1b9e8660>), ('end', <Element 'filename' at 0x1b9e8750>), ('end', <Element 'sum' at 0x1b9e8630>), ('end', <Element 'package' at 0x1b9e8780>), ('end', <Element 'filename' at 0x1b9e8570>), ('end', <Element 'sum' at 0x1b9e8510>), ('end', <Element 'package' at 0x1b9e8540>), ('end', <Element 'filename' at 0x1b9e8330>), ('end', <Element 'sum' at 0x1b9e8300>), ('end', <Element 'package' at 0x1b9e8360>), ('end', <Element 'filename' at 0x1b9e8120>), ('end', <Element 'sum' at 0x1b97df90>), ('end', <Element 'package' at 0x1b9e8180>), ('end', <Element 'filename' at 0x1b97dea0>), ('end', <Element 'sum' at 0x1b97dde0>), ('end', <Element 'package' at 0x1b97df00>), ('end', <Element 'filename' at 0x1b97dc60>), ('end', <Element 'sum' at 0x1b97dba0>), ('end', <Element 'package' at 0x1b97dcc0>), ('end', <Element 'collection' at 0x1b9e88d0>), ('end', <Element 'pkglist' at 0x1b9e8420>), ('end', <Element 'update' at 0x1b9ece10>), ('end', <Element 'id' at 0x1b97d7b0>), ('end', <Element 'title' at 0x1b97d7e0>), ('end', <Element 'issued' at 0x1b97d720>), ('end', <Element 'updated' at 0x1b97d570>), ('end', <Element 'description' at 0x1b97d5a0>), ('end', <Element 'reference' at 0x1b97d360>), ('end', <Element 'reference' at 0x1b97d120>), ('end', <Element 'reference' at 0x1b979e10>), ('end', <Element 'reference' at 0x1b979d20>), ('end', <Element 'reference' at 0x1b979ae0>), ('end', <Element 'reference' at 0x1b979810>)]
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 370951
: 251311