Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Attachment 464975 Details for
Bug 660303
pup error: TB9536d0ca <string>:64:__iter__:SyntaxError: mismatched tag
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh92 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
error log from pup application
package_update.txt (text/plain), 21.62 KB, created by
Branislav Náter
on 2010-12-06 12:48:03 UTC
(
hide
)
Description:
error log from pup application
Filename:
MIME Type:
Creator:
Branislav Náter
Created:
2010-12-06 12:48:03 UTC
Size:
21.62 KB
patch
obsolete
>Component: pirut >Summary: TB9536d0ca <string>:64:__iter__:SyntaxError: mismatched tag: line 240, column 1388 > >Traceback (most recent call last): > File "/usr/sbin/pup", line 617, in ? > main() > File "/usr/sbin/pup", line 613, in main > pup.run() > File "/usr/sbin/pup", line 451, in run > self.doRefresh() > File "/usr/sbin/pup", line 291, in doRefresh > self.populateUpdates() > File "/usr/sbin/pup", line 347, in populateUpdates > self.updateMetadata.add(repo) > File "/usr/lib/python2.4/site-packages/yum/update_md.py", line 424, in add > for event, elem in iterparse(infile): > File "<string>", line 64, in __iter__ >SyntaxError: mismatched tag: line 240, column 1388 > >Local variables in innermost frame: >b: <TreeBuilder object at 0x1a063d30> >self: <iterparse object at 0x1a703590> >event: ('end', <Element 'package' at 0x19d0c6c0>) >p: <XMLParser object at 0x1cfe2ab0> >data: 2-8.el5.x86_64.rpm</filename><sum type="md5">3fd46470d384c03e74cb2f89d1349df1</sum></package><package name="amanda-devel" version="2.5.0p2" release="8.el5" epoch="0" arch="x86_64" src="amanda-2.5.0p2-8.el5.src.rpm"><filename>amanda-devel-2.5.0p2-8.el5.x86_64.rpm</filename><sum type="md5">3738b0d77f1bafffb34a9d381f0ca801</sum></package><package name="amanda-client" version="2.5.0p2" release="8.el5" epoch="0" arch="x86_64" src="amanda-2.5.0p2-8.el5.src.rpm"><filename>amanda-client-2.5.0p2-8.el5.x86_64.rpm</filename><sum type="md5">1ecfc639edb8e0f97114d9eead06dece</sum></package><package name="amanda" version="2.5.0p2" release="8.el5" epoch="0" arch="x86_64" src="amanda-2.5.0p2-8.el5.src.rpm"><filename>amanda-2.5.0p2-8.el5.x86_64.rpm</filename><sum type="md5">13b91f36162c170b7ddf7d4a021f2e82</sum></package></collection></pkglist></update><update from="security@redhat.com" status="final" type="security" version="2"><id>RHSA-2009:1321</id><title>Low: nfs-utils security and bug fix update</title><issued date="2009-09-02 09:02:33"/><updated date="2009-09-02 09:02:33"/><description>The nfs-utils package provides a daemon for the kernel NFS server and >related tools. > >It was discovered that nfs-utils did not use tcp_wrappers correctly. >Certain hosts access rules defined in "/etc/hosts.allow" and >"/etc/hosts.deny" may not have been honored, possibly allowing remote >attackers to bypass intended access restrictions. (CVE-2008-4552) > >This updated package also fixes the following bugs: > >* the "LOCKD_TCPPORT" and "LOCKD_UDPPORT" options in "/etc/sysconfig/nfs" >were not honored: the lockd daemon continued to use random ports. With this >update, these options are honored. (BZ#434795) > >* it was not possible to mount NFS file systems from a system that has >the "/etc/" directory mounted on a read-only file system (this could occur >on systems with an NFS-mounted root file system). With this update, it is >possible to mount NFS file systems from a system that has "/etc/" mounted >on a read-only file system. (BZ#450646) > >* arguments specified by "STATDARG=" in "/etc/sysconfig/nfs" were removed >by the nfslock init script, meaning the arguments specified were never >passed to rpc.statd. With this update, the nfslock init script no longer >removes these arguments. (BZ#459591) > >* when mounting an NFS file system from a host not specified in the NFS >server's "/etc/exports" file, a misleading "unknown host" error was logged >on the server (the hostname lookup did not fail). With this update, a >clearer error message is provided for these situations. (BZ#463578) > >* the nhfsstone benchmark utility did not work with NFS version 3 and 4. >This update adds support to nhfsstone for NFS version 3 and 4. The new >nhfsstone "-2", "-3", and "-4" options are used to select an NFS version >(similar to nfsstat(8)). (BZ#465933) > >* the exportfs(8) manual page contained a spelling mistake, "djando", in >the EXAMPLES section. (BZ#474848) > >* in some situations the NFS server incorrectly refused mounts to hosts >that had a host alias in a NIS netgroup. (BZ#478952) > >* in some situations the NFS client used its cache, rather than using >the latest version of a file or directory from a given export. This update >adds a new mount option, "lookupcache=", which allows the NFS client to >control how it caches files and directories. Note: The Red Hat Enterprise >Linux 5.4 kernel update (the fourth regular update) must be installed in >order to use the "lookupcache=" option. Also, "lookupcache=" is currently >only available for NFS version 3. Support for NFS version 4 may be >introduced in future Red Hat Enterprise Linux 5 updates. Refer to Red Hat >Bugzilla #511312 for further information. (BZ#489335) > >Users of nfs-utils should upgrade to this updated package, which contains >backported patches to correct these issues. After installing this update, >the nfs service will be restarted automatically.</description><references><reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=434795" id="434795" type="bugzilla">['lockd not using settings in sysconfig/nfs']</reference><reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=450646" id="450646" type="bugzilla">['/sbin/mount.nfs fails with read-only /etc']</reference><reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=458676" id="458676" type="bugzilla">['CVE-2008-4552 nfs-utils: incorrect use of tcp_wrappers, causing hostname-based rules to be ignored']</reference><reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=459591" id="459591" type="bugzilla">['rpc.statd options not correctly parsed']</reference><reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=463578" id="463578" type="bugzilla">["confusing 'mount request from unknown host' messages"]</reference><reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=465933" id="465933" type="bugzilla">['nhfsstone does not support NFSv3 and v4']</reference><reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=474848" id="474848" type="bugzilla">['typo in exportfs manpage']</reference><reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=489335" id="489335" type="bugzilla">['Add support for lookupcache= option in nfs-utils.']</reference><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=com.redhat.rhn.domain.errata.Cve@55e255e2" id="CVE-2008-4552" type="cve"/></references><pkglist><collection short="rhel-x86_64-server-5"><name>Red Hat Enterprise Linux (v. 5 for 64-bit x86_64)</name><package name="nfs-utils" version="1.0.9" release="42.el5" epoch="1" arch="x86_64" src="nfs-utils-1.0.9-42.el5.src.rpm"><filename>nfs-utils-1.0.9-42.el5.x86_64.rpm</filename><sum type="md5">68cb9f95fc5926e7053efaba90fbc273</sum></package></collection></pkglist></update><update from="security@redhat.com" status="final" type="bugfix" version="3"><id>RHBA-2009:1679</id><title>paps bug fix update</title><issued date="2009-12-16 06:00:00"/><updated date="2010-03-30 06:00:00"/><description>Paps reads UTF-8 encoded text files and renders them to a PostScript file. >It uses the pango library to create the outline curves. The paps package >also includes the libpaps library, which simplifies PostScript rendering >for any pango-based applications (for example, programs that use the GTK+ >widget toolkit). As well, paps is used as the CUPS text filter, allowing >CUPS to handle UTF-8 encoded strings. > >This update addresses the following issue: > >* when paps was used as the CUPS text filter with a "wrap=false" parameter, >paps did not honor the parameter: text was wrapped to fit the page despite >the parameter instructing otherwise. Paps now calls pango's word wrap >functions correctly and, consequently, honors this parameter as expected. >(BZ#520590) > >All paps users should upgrade to this updated package, which resolve this >issue.</description><references><reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=520590" id="520590" type="bugzilla">['texttopaps and wrap=false']</reference></references><pkglist><collection short="rhel-x86_64-server-5"><name>Red Hat Enterprise Linux (v. 5 for 64-bit x86_64)</name><package name="paps" version="0.6.6" release="19.el5" epoch="0" arch="x86_64" src="paps-0.6.6-19.el5.src.rpm"><filename>paps-0.6.6-19.el5.x86_64.rpm</filename><sum type="md5">e9709d894c4370fc68a80ca82a453d9a</sum></package></collection></pkglist></update><update from="security@redhat.com" status="final" type="security" version="5"><id>RHSA-2008:0849</id><title>Important: ipsec-tools security update</title><issued date="2008-08-26 06:00:00"/><updated date="2008-08-26 06:00:00"/><description>The ipsec-tools package is used in conjunction with the IPsec functionality >in the Linux kernel and includes racoon, an IKEv1 keying daemon. > >Two denial of service flaws were found in the ipsec-tools racoon daemon. It >was possible for a remote attacker to cause the racoon daemon to consume >all available memory. (CVE-2008-3651, CVE-2008-3652) > >Users of ipsec-tools should upgrade to this updated package, which contains >backported patches that resolve these issues.</description><references><reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=456660" id="456660" type="bugzilla">['CVE-2008-3651 ipsec-tools: racoon memory leak caused by invalid proposals']</reference><reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=458846" id="458846" type="bugzilla">['CVE-2008-3652 ipsec-tools: racoon orphaned ph1s memory leak']</reference><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=com.redhat.rhn.domain.errata.Cve@1d801d8" id="CVE-2008-3652" type="cve"/><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=com.redhat.rhn.domain.errata.Cve@23d023d" id="CVE-2008-3651" type="cve"/></references><pkglist><collection short="rhel-x86_64-server-5"><name>Red Hat Enterprise Linux (v. 5 for 64-bit x86_64)</name><package name="ipsec-tools" version="0.6.5" release="9.el5_2.3" epoch="0" arch="x86_64" src="ipsec-tools-0.6.5-9.el5_2.3.src.rpm"><filename>ipsec-tools-0.6.5-9.el5_2.3.x86_64.rpm</filename><sum type="md5">2a8a07f1aa7da017f4ce8a7a8fae4305</sum></package></collection></pkglist></update><update from="security@redhat.com" status="final" type="security" version="4"><id>RHSA-2007:0724</id><title>Critical: firefox security update</title><issued date="2007-07-18 06:00:00"/><updated date="2007-12-04 06:00:00"/><description>Mozilla Firefox is an open source Web browser. > >Several flaws were found in the way Firefox processed certain malformed >JavaScript code. A web page containing malicious JavaScript code could >cause Firefox to crash or potentially execute arbitrary code as the user >running Firefox. (CVE-2007-3734, CVE-2007-3735, CVE-2007-3737, CVE-2007-3738) > >Several content injection flaws were found in the way Firefox handled >certain JavaScript code. A web page containing malicious JavaScript code >could inject arbitrary content into other web pages. (CVE-2007-3736, >CVE-2007-3089) > >A flaw was found in the way Firefox cached web pages on the local disk. A >malicious web page may be able to inject arbitrary HTML into a browsing >session if the user reloads a targeted site. (CVE-2007-3656) > >Users of Firefox are advised to upgrade to these erratum packages, which >contain backported patches that correct these issues.</description><references><reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248518" id="248518" type="bugzilla">['CVE-2007-3089 various flaws in mozilla products (CVE-2007-3734 CVE-2007-3735 CVE-2007-3736 CVE-2007-3737 CVE-2007-3656 CVE-2007-3738)']</reference><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=com.redhat.rhn.domain.errata.Cve@7a007a0" id="CVE-2007-3656" type="cve"/><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=com.redhat.rhn.domain.errata.Cve@9340934" id="CVE-2007-3735" type="cve"/><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=com.redhat.rhn.domain.errata.Cve@8050805" id="CVE-2007-3089" type="cve"/><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=com.redhat.rhn.domain.errata.Cve@9990999" id="CVE-2007-3734" type="cve"/><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=com.redhat.rhn.domain.errata.Cve@86a086a" id="CVE-2007-3737" type="cve"/><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=com.redhat.rhn.domain.errata.Cve@9fe09fe" id="CVE-2007-3738" type="cve"/><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=com.redhat.rhn.domain.errata.Cve@8cf08cf" id="CVE-2007-3736" type="cve"/></references><pkglist><collection short="rhel-x86_64-server-5"><name>Red Hat Enterprise Linux (v. 5 for 64-bit x86_64)</name><package name="firefox" version="1.5.0.12" release="3.el5" epoch="0" arch="x86_64" src="firefox-1.5.0.12-3.el5.src.rpm"><filename>firefox-1.5.0.12-3.el5.x86_64.rpm</filename><sum type="md5">5d2539b4e150e2ebea6c6304a4c08325</sum></package><package name="firefox-devel" version="1.5.0.12" release="3.el5" epoch="0" arch="i386" src="firefox-1.5.0.12-3.el5.src.rpm"><filename>firefox-devel-1.5.0.12-3.el5.i386.rpm</filename><sum type="md5">be1322bcd982139d6bd88a739af188a8</sum></package><package name="firefox-devel" version="1.5.0.12" release="3.el5" epoch="0" arch="x86_64" src="firefox-1.5.0.12-3.el5.src.rpm"><filename>firefox-devel-1.5.0.12-3.el5.x86_64.rpm</filename><sum type="md5">ecfcecad587c5b5a87ecb990407768c1</sum></package><package name="firefox" version="1.5.0.12" release="3.el5" epoch="0" arch="i386" src="firefox-1.5.0.12-3.el5.src.rpm"><filename>firefox-1.5.0.12-3.el5.i386.rpm</filename><sum type="md5">41f9235be61710608c049fed0c39ba19</sum></package></collection></pkglist></update><update from="security@redhat.com" status="final" type="bugfix" version="1"><id>RHBA-2009:1242</id><title>selinux-policy bug fix update</title><issued date="2009-09-02 09:02:33"/><updated date="2009-09-02 09:02:33"/><description>The selinux-policy packages contain the rules that govern how confined >processes run on the system. > >These updated packages resolve several bugs in Security-Enhanced Linux >(SELinux) policy as shipped with Red Hat Enterprise Linux 5. The majority >of these bugs resulted in SELinux denying legitimate access. > >Refer to the Red Hat Enterprise Linux 5.4 Technical Notes for detailed >documentation on the bug fixes applied by this update. A link to >the section for this selinux-policy update is in the "References" below. > >All users are advised to upgrade to these updated packages, which resolve >these issues.</description><references><reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=429726" id="429726" type="bugzilla">['Allow samba to change unix passwords']</reference><reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=475562" id="475562" type="bugzilla">['SELinux is preventing perl (logwatch_t) "write" to ./services (etc_t).']</reference><reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=477123" id="477123" type="bugzilla">['Typo errors in man pages']</reference><reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=479819" id="479819" type="bugzilla">['postgrey avc: denied socket connection']</reference><reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=480943" id="480943" type="bugzilla">['SELinux is preventing nm-system-setti after update to 5.3']</reference><reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=481387" id="481387" type="bugzilla">['selinux prevents "getattr" and "execute"']</reference><reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=481628" id="481628" type="bugzilla">['AVCs for system_dbusd_t -> [ hal_t, unconfined_t']</reference><reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=481706" id="481706" type="bugzilla">['SELinux is preventing automount (automount_t) "signal" to <Unknown> (mount_t).']</reference><reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=483173" id="483173" type="bugzilla">['SELinux prevents nm-system-setti (system_dbusd_t) "getsched"']</reference><reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=484146" id="484146" type="bugzilla">['setsebool -P samba_enable_home_dirs=1 is not completely effective.']</reference><reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=485078" id="485078" type="bugzilla">['Wrong security context for sysstat package']</reference><reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=485107" id="485107" type="bugzilla">['Cannot execute spamc from procmail']</reference><reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=485111" id="485111" type="bugzilla">["samba not able to access users' public_html directory"]</reference><reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=486187" id="486187" type="bugzilla">['RHEL-5.3 selinux-policy broke spamassassin']</reference><reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=486354" id="486354" type="bugzilla">['Cannot boot RHEL5.3 with strict enforcing selinux']</reference><reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=486965" id="486965" type="bugzilla">['cannot open matlab on redhat EL 5.3, unless I override / change selinux settings']</reference><reference href="http://bugzilla.re >events: [('end', <Element 'filename' at 0x19d0ca80>), ('end', <Element 'sum' at 0x19d0cc00>), ('end', <Element 'package' at 0x19d0c9c0>), ('end', <Element 'filename' at 0x19d0cd80>), ('end', <Element 'sum' at 0x19d0cf60>), ('end', <Element 'package' at 0x19d0cd20>), ('end', <Element 'filename' at 0x19d0e150>), ('end', <Element 'sum' at 0x19d0e090>), ('end', <Element 'package' at 0x19d0e030>), ('end', <Element 'filename' at 0x19d0e5a0>), ('end', <Element 'sum' at 0x19d0e4e0>), ('end', <Element 'package' at 0x19d0e420>), ('end', <Element 'collection' at 0x19d0c270>), ('end', <Element 'pkglist' at 0x19d0c1b0>), ('end', <Element 'update' at 0x1a06a360>), ('end', <Element 'id' at 0x19d0e750>), ('end', <Element 'title' at 0x19d0e8a0>), ('end', <Element 'issued' at 0x19d0e7e0>), ('end', <Element 'updated' at 0x19d0e8d0>), ('end', <Element 'description' at 0x19d0e960>), ('end', <Element 'reference' at 0x19d0e930>), ('end', <Element 'reference' at 0x19d0eb10>), ('end', <Element 'reference' at 0x19d0eb70>), ('end', <Element 'reference' at 0x19d0ede0>), ('end', <Element 'reference' at 0x19d0ee10>), ('end', <Element 'reference' at 0x19d0ef60>), ('end', <Element 'reference' at 0x19d0ef30>), ('end', <Element 'reference' at 0x19d10030>), ('end', <Element 'reference' at 0x19d101e0>), ('end', <Element 'references' at 0x19d0e7b0>), ('end', <Element 'name' at 0x19d101b0>), ('end', <Element 'filename' at 0x19d105d0>), ('end', <Element 'sum' at 0x19d10660>), ('end', <Element 'package' at 0x19d104e0>), ('end', <Element 'collection' at 0x19d102d0>), ('end', <Element 'pkglist' at 0x19d10120>), ('end', <Element 'update' at 0x19d0e660>), ('end', <Element 'id' at 0x19d106f0>), ('end', <Element 'title' at 0x19d10720>), ('end', <Element 'issued' at 0x19d10750>), ('end', <Element 'updated' at 0x19d10780>), ('end', <Element 'description' at 0x19d10930>), ('end', <Element 'reference' at 0x19d10ab0>), ('end', <Element 'references' at 0x19d10810>), ('end', <Element 'name' at 0x19d10d20>), ('end', <Element 'filename' at 0x19d10e70>), ('end', <Element 'sum' at 0x19d10f30>), ('end', <Element 'package' at 0x19d10f90>), ('end', <Element 'collection' at 0x19d108d0>), ('end', <Element 'pkglist' at 0x19d10ba0>), ('end', <Element 'update' at 0x19d10630>), ('end', <Element 'id' at 0x19d12120>), ('end', <Element 'title' at 0x19d121b0>), ('end', <Element 'issued' at 0x19d121e0>), ('end', <Element 'updated' at 0x19d122d0>), ('end', <Element 'description' at 0x19d12270>), ('end', <Element 'reference' at 0x19d124e0>), ('end', <Element 'reference' at 0x19d125a0>), ('end', <Element 'reference' at 0x19d12720>), ('end', <Element 'reference' at 0x19d12810>), ('end', <Element 'references' at 0x19d12450>), ('end', <Element 'name' at 0x19d129f0>), ('end', <Element 'filename' at 0x19d12ba0>), ('end', <Element 'sum' at 0x19d12d20>), ('end', <Element 'package' at 0x19d12c60>), ('end', <Element 'collection' at 0x19d12900>), ('end', <Element 'pkglist' at 0x19d127b0>), ('end', <Element 'update' at 0x19d12030>), ('end', <Element 'id' at 0x19d12e10>), ('end', <Element 'title' at 0x19d12ea0>), ('end', <Element 'issued' at 0x19d12ed0>), ('end', <Element 'updated' at 0x19d12f60>), ('end', <Element 'description' at 0x19d12f90>), ('end', <Element 'reference' at 0x19d17060>), ('end', <Element 'reference' at 0x19d17150>), ('end', <Element 'reference' at 0x19d17240>), ('end', <Element 'reference' at 0x19d17360>), ('end', <Element 'reference' at 0x19d17420>), ('end', <Element 'reference' at 0x19d17660>), ('end', <Element 'reference' at 0x19d17690>), ('end', <Element 'reference' at 0x19d177b0>), ('end', <Element 'references' at 0x19d12ab0>), ('end', <Element 'name' at 0x19d178d0>), ('end', <Element 'filename' at 0x19d17c00>), ('end', <Element 'sum' at 0x19d17c90>), ('end', <Element 'package' at 0x19d17ab0>), ('end', <Element 'filename' at 0x19d17d80>), ('end', <Element 'sum' at 0x19d17e40>), ('end', <Element 'package' at 0x19d17e70>), ('end', <Element 'filename' at 0x19d18120>), ('end', <Element 'sum' at 0x19d18210>), ('end', <Element 'package' at 0x19d18030>), ('end', <Element 'filename' at 0x19d18450>), ('end', <Element 'sum' at 0x19d184b0>), ('end', <Element 'package' at 0x19d183c0>), ('end', <Element 'collection' at 0x19d17810>), ('end', <Element 'pkglist' at 0x19d17750>), ('end', <Element 'update' at 0x19d12de0>), ('end', <Element 'id' at 0x19d18630>), ('end', <Element 'title' at 0x19d18690>), ('end', <Element 'issued' at 0x19d187e0>), ('end', <Element 'updated' at 0x19d18750>), ('end', <Element 'description' at 0x19d18810>), ('end', <Element 'reference' at 0x19d18870>), ('end', <Element 'reference' at 0x19d18a50>), ('end', <Element 'reference' at 0x19d18c30>), ('end', <Element 'reference' at 0x19d18cc0>), ('end', <Element 'reference' at 0x19d18e10>), ('end', <Element 'reference' at 0x19d18fc0>), ('end', <Element 'reference' at 0x19d184e0>)]
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 660303
: 464975 |
472060