Bug 678399

Summary: I can't access bug #632802 anymore
Product: [Fedora] Fedora Reporter: adydeac <redhat>
Component: xenAssignee: Xen Maintainance List <xen-maint>
Status: CLOSED NOTABUG QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: urgent Docs Contact:
Priority: unspecified    
Version: rawhideCC: berrange, drjones, jforbes, kraxel, m.a.young, redhat, virt-maint, xen-maint
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-02-17 16:58:12 EST Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Description adydeac 2011-02-17 14:55:35 EST
Description of problem:
I can't access bug #632802 anymore


Version-Release number of selected component (if applicable):
NA

How reproducible:
https://bugzilla.redhat.com/show_bug.cgi?id=632802

Steps to Reproduce:
1. open browser
2. open url https://bugzilla.redhat.com/show_bug.cgi?id=632802
3. get the "You are not authorized to access bug #632802." message
  
Actual results:
You are not authorized to access bug #632802.

Expected results:
The bug details as I was getting until today.

Additional info:
Comment 1 Michael Young 2011-02-17 16:58:12 EST
Not a bug in the xen package.
Comment 2 Andrew Jones 2011-02-18 02:59:05 EST
(In reply to comment #0)
> Actual results:
> You are not authorized to access bug #632802.
> 
> Expected results:
> The bug details as I was getting until today.

This has been corrected. There was some concern that knowledge of this bug could be used for a malicious DoS attack, so someone hid it from the public eye. I've reopened it because it really seems to only happen in very special circumstances, and if you have those circumstances than your guest is crashing nearly every day anyway, so you have bigger concerns than someone exploiting it to crash you once in a while.