Tend to pending moderator requests error

Bug #266139 reported by Cunoodle2
2
Affects Status Importance Assigned to Milestone
GNU Mailman
New
Medium
Unassigned

Bug Description

I was logged in to manage my list and clicked on the link
that said "Tend to pending moderator requests " and I
got an error. Here it is...

Bug in Mailman version 2.1.5

We're sorry, we hit a bug!
If you would like to help us identify the problem, please
email a copy of this page to the webmaster for this site
with a description of what happened. Thanks!

Traceback:

Traceback (most recent call last):
  File "/usr/local/cpanel/3rdparty/mailman/scripts/driver",
line 87, in run_main
    main()

File "/usr/local/cpanel/3rdparty/mailman/Mailman/Cgi/admi
ndb.py", line 246, in main
    print doc.Format()

File "/usr/local/cpanel/3rdparty/mailman/Mailman/htmlfor
mat.py", line 331, in Format
    output.append(Container.Format(self, indent))

File "/usr/local/cpanel/3rdparty/mailman/Mailman/htmlfor
mat.py", line 264, in Format
    output.append(HTMLFormatObject(item, indent))

File "/usr/local/cpanel/3rdparty/mailman/Mailman/htmlfor
mat.py", line 50, in HTMLFormatObject
    return item.Format(indent)

File "/usr/local/cpanel/3rdparty/mailman/Mailman/htmlfor
mat.py", line 417, in Format
    output = output + Container.Format(self, indent+2)

File "/usr/local/cpanel/3rdparty/mailman/Mailman/htmlfor
mat.py", line 264, in Format
    output.append(HTMLFormatObject(item, indent))

File "/usr/local/cpanel/3rdparty/mailman/Mailman/htmlfor
mat.py", line 50, in HTMLFormatObject
    return item.Format(indent)

File "/usr/local/cpanel/3rdparty/mailman/Mailman/htmlfor
mat.py", line 200, in Format
    output = output + self.FormatRow(i, indent + 2)
MemoryError

------------------------------------------------------
--------------------------

Python information:
Variable Value
sys.version 2.2.2 (#1, Jan 30 2003, 21:26:22) [GCC
2.96 20000731 (Red Hat Linux 7.3 2.96-112)]
sys.executable /usr/bin/python2
sys.prefix /usr
sys.exec_prefix /usr
sys.path /usr
sys.platform linux2

------------------------------------------------------
--------------------------

Environment variables:
Variable Value
HTTP_COOKIE
cpin_christianparents.com+admin=2802000000699cdd774
17328000000373338303438623638373364366135356262
32663961613331353935623932346338343832323465
SERVER_SOFTWARE Apache/1.3.31 (Unix)
mod_auth_passthrough/1.8 mod_log_bytes/1.2
mod_bwlimited/1.4 PHP/4.3.9 FrontPage/5.0.2.2634a
mod_ssl/2.8.20 OpenSSL/0.9.6b
PYTHONPATH /usr/local/cpanel/3rdparty/mailman
SCRIPT_FILENAME /usr/local/cpanel/3rdparty/mailman/c
gi-bin/admindb
SERVER_ADMIN <email address hidden>
SCRIPT_NAME /mailman/admindb
REQUEST_METHOD GET
HTTP_HOST christianparents.com
PATH_INFO /cpin_christianparents.com
SERVER_PROTOCOL HTTP/1.1
QUERY_STRING
REQUEST_URI /mailman/admindb/cpin_christianparents.c
om
HTTP_ACCEPT image/gif, image/x-xbitmap, image/jpeg,
image/pjpeg, application/x-shockwave-flash,
application/vnd.ms-powerpoint, application/vnd.ms-
excel, application/msword, */*
HTTP_USER_AGENT Mozilla/4.0 (compatible; MSIE 6.0;
Windows NT 5.1; SV1; NetCaptor 7.5.2; (R1 1.5))
HTTP_CONNECTION Keep-Alive
HTTP_REFERER
http://christianparents.com/mailman/admin/cpin_christian
parents.com/members
SERVER_NAME www.christianparents.com
REMOTE_ADDR 69.49.193.98
REMOTE_PORT 18495
HTTP_ACCEPT_LANGUAGE en-us
PATH_TRANSLATED /home/chris/public_html/cpin_christi
anparents.com
SERVER_PORT 80
GATEWAY_INTERFACE CGI/1.1
HTTP_ACCEPT_ENCODING gzip, deflate
SERVER_ADDR 205.243.144.12
DOCUMENT_ROOT /home/chris/public_html

[http://sourceforge.net/tracker/index.php?func=detail&aid=1051615&group_id=103&atid=100103]

Revision history for this message
Plasmadog (plasmadog) wrote :

I get this same error, also with v2.1.5
In my case, it appears that some messages with very large
attachments were sent to the list. The messages were held
for moderator approval, but now I can't do anything with
them. I can neither approve them for sending, nor discard
them. Any attempt to do anything with them, even view their
details, is met by the same error.

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.