List Of Software Bugs
   HOME

TheInfoList



OR:

Many
software bug A software bug is a design defect ( bug) in computer software. A computer program with many or serious bugs may be described as ''buggy''. The effects of a software bug range from minor (such as a misspelled word in the user interface) to sev ...
s are merely annoying or inconvenient, but some can have extremely serious consequences—either financially or as a threat to human well-being. The following is a list of software bugs with significant consequences.


Administration

* The software of the A2LL system for handling unemployment and social services in Germany presented several errors with large-scale consequences, such as sending the payments to invalid account numbers in 2004.


Blockchain

* The DAO bug. On June 17, 2016, the DAO was subjected to an attack exploiting a combination of vulnerabilities, including the one concerning recursive calls, that resulted in the transfer of 3.6 million
Ether In organic chemistry, ethers are a class of compounds that contain an ether group, a single oxygen atom bonded to two separate carbon atoms, each part of an organyl group (e.g., alkyl or aryl). They have the general formula , where R and R†...
 â€“ around a third of the 11.5 million Ether that had been committed to The DAO â€“ valued at the time at around $50M.


Electric power transmission

* The Northeast blackout of 2003 was triggered by a local outage that went undetected due to a
race condition A race condition or race hazard is the condition of an electronics, software, or other system where the system's substantive behavior is dependent on the sequence or timing of other uncontrollable events, leading to unexpected or inconsistent ...
in General Electric Energy's XA/21 monitoring software.


Encryption

''See also :Computer security exploits'' * In order to fix a warning issued by Valgrind, a maintainer of
Debian Debian () is a free and open-source software, free and open source Linux distribution, developed by the Debian Project, which was established by Ian Murdock in August 1993. Debian is one of the oldest operating systems based on the Linux kerne ...
patched
OpenSSL OpenSSL is a software library for applications that provide secure communications over computer networks against eavesdropping, and identify the party at the other end. It is widely used by Internet servers, including the majority of HTTPS web ...
and broke the random number generator in the process. The patch was uploaded in September 2006 and made its way into the official release; it was not reported until April 2008. Every key generated with the broken version is compromised (as the "random" numbers were made easily predictable), as is all data encrypted with it, threatening many applications that rely on encryption such as S/MIME,
Tor Tor, TOR or ToR may refer to: Places * Toronto, Canada ** Toronto Raptors * Tor, Pallars, a village in Spain * Tor, former name of Sloviansk, Ukraine, a city * Mount Tor, Tasmania, Australia, an extinct volcano * Tor Bay, Devon, England * Tor ...
, SSL or TLS protected connections and SSH. *
Heartbleed Heartbleed is a security bug in some outdated versions of the OpenSSL cryptography library, which is a widely used implementation of the Transport Layer Security (TLS) protocol. It was introduced into the software in 2012 and publicly disclos ...
, an OpenSSL vulnerability introduced in 2012 and disclosed in April 2014, removed confidentiality from affected services, causing among other things the shutdown of the
Canada Revenue Agency The Canada Revenue Agency (CRA; ; ) is the revenue service of the Government of Canada, Canadian federal government, and most Provinces and territories of Canada, provincial and territorial governments. The CRA collects Taxation in Canada, taxes, ...
's public access to the online filing portion of its website following the theft of social insurance numbers. * The Apple " goto fail" bug was a duplicated line of code which caused a public key certificate check to pass a test incorrectly. * The GnuTLS "goto fail" bug was similar to the Apple bug and found about two weeks later. The GnuTLS bug also allowed attackers to bypass SSL/TLS security.


Finance

* The Vancouver Stock Exchange index had large errors due to repeated rounding. In January 1982 the index was initialized at 1000 and subsequently updated and truncated to three decimal places on each trade. This was done about 3000 times a day. The accumulated truncations led to an erroneous loss of around 25 points per month. Over the weekend of November 25–28, 1983, the error was corrected, raising the value of the index from its Friday closing figure of 524.811 to 1098.892. * Knight Capital Group lost $440 million in 45 minutes due to the improper deployment of software on servers and the re-use of a critical software flag that caused old unused software code to execute during trading. * The British Post Office scandal; between 2000 and 2015, 736 subpostmasters were prosecuted by the UK Post Office, with many falsely convicted and sent to prison. The subpostmasters were blamed for financial shortfalls which actually were caused by software defects in the Post Office's Horizon accounting software.


Media

* In the Sony BMG copy protection rootkit scandal (October 2005),
Sony BMG Sony BMG Music Entertainment was an American record company owned as a 50–50 joint venture between Sony Corporation of America and Bertelsmann. The venture's successor, the revived Sony Music, is wholly owned by Sony, following their buyout o ...
produced a Van Zant music CD that employed a
copy protection Copy protection, also known as content protection, copy prevention and copy restriction, is any measure to enforce copyright by preventing the reproduction of software, films, music, and other media. Copy protection is most commonly found on vid ...
scheme that covertly installed a
rootkit A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the exist ...
on any Windows PC that was used to play it. Their intent was to hide the copy protection mechanism to make it harder to circumvent. Unfortunately, the rootkit inadvertently opened a security hole resulting in a wave of successful
trojan horse In Greek mythology, the Trojan Horse () was a wooden horse said to have been used by the Greeks during the Trojan War to enter the city of Troy and win the war. The Trojan Horse is not mentioned in Homer, Homer's ''Iliad'', with the poem ending ...
attacks on the computers of those who had innocently played the CD. Sony's subsequent efforts to provide a utility to fix the problem actually exacerbated it.


Medical

* A bug in the code controlling the Therac-25
radiation therapy Radiation therapy or radiotherapy (RT, RTx, or XRT) is a therapy, treatment using ionizing radiation, generally provided as part of treatment of cancer, cancer therapy to either kill or control the growth of malignancy, malignant cell (biology), ...
machine was directly responsible for at least five patient deaths in the 1980s when it administered excessive quantities of beta radiation. * Radiation therapy planning software RTP/2 created by Multidata Systems International could incorrectly double the dosage of radiation depending on how the technician entered data into the machine. At least eight patients died, while another 20 received overdoses likely to cause significant health problems (November 2000). * A Medtronic heart device was found vulnerable to remote attacks (2008-03). * The Becton Dickinson Alaris Gateway Workstation allows unauthorized arbitrary remote execution (2019). * The CareFusion Alaris pump module (8100) will not properly delay an Infusion when the "Delay Until" option or "Multidose" feature is used (2015).


Military

* The software error of a MIM-104 Patriot caused its system clock to drift by one third of a second over a period of one hundred hours – resulting in failure to locate and intercept an incoming Iraqi Al Hussein missile, which then struck Dharan barracks, Saudi Arabia (February 25, 1991), killing 28 Americans. * A Royal Air Force Chinook helicopter crashed into the Mull of Kintyre in June 1994, killing 29. Initially, the crash was dismissed as pilot error, but an investigation by ''
Computer Weekly ''Computer Weekly'' is a digital magazine and website for IT professionals in the United Kingdom owned by Informa TechTarget. It was formerly published as a weekly print magazine by Reed Business Information for over 50 years. Topics covered wit ...
'' uncovered sufficient evidence to convince a
House of Lords The House of Lords is the upper house of the Parliament of the United Kingdom. Like the lower house, the House of Commons of the United Kingdom, House of Commons, it meets in the Palace of Westminster in London, England. One of the oldest ext ...
inquiry that it may have been caused by a software bug in the aircraft's engine control computer. * Smart ship USS ''Yorktown'' was left dead in the water in September 1997 for nearly 3 hours after a divide by zero error. * In April 1992 the first Lockheed YF-22 crashed while landing at
Edwards Air Force Base Edwards Air Force Base (AFB) is a United States Air Force installation in California. Most of the base sits in Kern County, California, Kern County, but its eastern end is in San Bernardino County, California, San Bernardino County and a souther ...
, California. The cause of the crash was found to be a flight control software error that failed to prevent a pilot-induced oscillation. * While attempting its first overseas deployment to the Kadena Air Base in Okinawa, Japan, on 11 February 2007, a group of six F-22 Raptors flying from Hickam AFB, Hawaii, experienced multiple computer crashes coincident with their crossing of the 180th meridian of
longitude Longitude (, ) is a geographic coordinate that specifies the east- west position of a point on the surface of the Earth, or another celestial body. It is an angular measurement, usually expressed in degrees and denoted by the Greek lett ...
(the
International Date Line The International Date Line (IDL) is the line extending between the South and North Poles that is the boundary between one calendar day and the next. It passes through the Pacific Ocean, roughly following the 180.0° line of longitude and de ...
). The computer failures included at least navigation (completely lost) and communication. The fighters were able to return to Hawaii by following their tankers, something that might have been problematic had the weather not been good. The error was fixed within 48 hours, allowing a delayed deployment.


Space

*
NASA The National Aeronautics and Space Administration (NASA ) is an independent agencies of the United States government, independent agency of the federal government of the United States, US federal government responsible for the United States ...
's 1965 Gemini 5 mission landed short of its intended splashdown point when the pilot compensated manually for an incorrect constant for the Earth's rotation rate. A 360-degree rotation corresponding to the Earth's rotation relative to the fixed stars was used instead of the 360.98-degree rotation in a 24-hour
solar day A synodic day (or synodic rotation period or solar day) is the period for a celestial object to rotate once in relation to the star it is orbiting, and is the basis of solar time. The synodic day is distinguished from the sidereal day, which is ...
. The shorter length of the first three missions and a computer failure on
Gemini 4 Gemini 4 (officially Gemini IV) With Gemini IV, NASA changed to Roman numerals for Gemini mission designations. was the second crewed spaceflight in NASA's Project Gemini, occurring in June 1965. It was the tenth crewed American spaceflight (in ...
prevented the bug from being detected earlier. * The Russian Space Research Institute's
Phobos 1 ''Phobos 1'' was an uncrewed Soviet space probe of the Phobos program, Phobos Program launched from the Baikonur Cosmodrome, Baikonour launch facility on 7 July 1988. Its intended mission was to explore Mars and its moons Phobos (moon), Phobos ...
(
Phobos program The Phobos program () was an uncrewed space mission consisting of two probes launched by the Soviet Union to study Mars Mars is the fourth planet from the Sun. It is also known as the "Red Planet", because of its orange-red appeara ...
) deactivated its attitude thrusters and could no longer properly orient its solar arrays or communicate with Earth, eventually depleting its batteries. (September 10, 1988). * The
European Space Agency The European Space Agency (ESA) is a 23-member International organization, international organization devoted to space exploration. With its headquarters in Paris and a staff of around 2,547 people globally as of 2023, ESA was founded in 1975 ...
's
Ariane flight V88 Ariane flight V88 was the failed maiden flight of the Arianespace Ariane 5 rocket, vehicle no. 501, on 4 June 1996. It carried the Cluster spacecraft, a constellation of four European Space Agency research satellites. The launch ended in fa ...
was destroyed 40 seconds after takeoff (June 4, 1996). The first flight of the Ariane V rocket self-destructed due to an overflow occurring during a floating-point to integer conversion in the on-board guidance software. The same software had been used successfully in the Ariane IV program, but the Ariane V produced larger values for at least one variable, causing the overflow. * In 1997, the
Mars Pathfinder ''Mars Pathfinder'' was an American robotic spacecraft that landed a base station with a rover (space exploration), roving probe on Mars in 1997. It consisted of a Lander (spacecraft), lander, renamed the Carl Sagan Memorial Station, and a ligh ...
mission was jeopardised by a bug in concurrent software shortly after the rover landed, which was found in preflight testing but given a low priority as it only occurred in certain unanticipated heavy-load conditions. The problem, which was identified and corrected from Earth, was due to computer resets caused by
priority inversion In computer science, priority inversion is a scenario in scheduling in which a high-priority task is indirectly superseded by a lower-priority task, effectively inverting the assigned priorities of the tasks. This violates the priority model tha ...
. * In 2000, a Zenit 3SL launch failed due to faulty ground software not closing a valve in the rocket's second stage pneumatic system. * The
European Space Agency The European Space Agency (ESA) is a 23-member International organization, international organization devoted to space exploration. With its headquarters in Paris and a staff of around 2,547 people globally as of 2023, ESA was founded in 1975 ...
's CryoSat-1 satellite was lost in a launch failure in 2005 due to a missing shutdown command in the flight control system of its
Rokot Rokot ( meaning ''Rumble'' or ''Boom''), also transliterated Rockot, was a Soviet Union (later Russian) space launch vehicle that was capable of launching a payload of into a Earth orbit with 63° inclination. It was based on the UR-100N ( ...
carrier rocket A launch vehicle is typically a rocket-powered vehicle designed to carry a payload (a crewed spacecraft or satellites) from Earth's surface or lower atmosphere to outer space. The most common form is the ballistic missile-shaped multistag ...
. * NASA Mars Polar Lander was destroyed because its flight software mistook vibrations caused by the deployment of the stowed legs for evidence that the vehicle had landed and shut off the engines 40 meters from the Martian surface (December 3, 1999). * Its sister spacecraft ''
Mars Climate Orbiter The ''Mars Climate Orbiter'' (formerly the Mars Surveyor '98 Orbiter) was a robotic space probe launched by NASA on December 11, 1998, to study the Martian climate, Martian atmosphere, and surface changes and to act as the communications rel ...
'' was also destroyed, due to software on the ground generating commands based on parameters in pound-force (lbf) rather than newtons (N). * A mis-sent command from Earth caused the software of the NASA ''
Mars Global Surveyor ''Mars Global Surveyor'' (MGS) was an American Robotic spacecraft, robotic space probe developed by NASA's Jet Propulsion Laboratory. It launched November 1996 and collected data from 1997 to 2006. MGS was a global mapping mission that examined ...
'' to incorrectly assume that a motor had failed, causing it to point one of its batteries at the sun. This caused the battery to overheat (November 2, 2006). * NASA's ''Spirit'' rover became unresponsive on January 21, 2004, a few weeks after landing on Mars. Engineers found that too many files had accumulated in the rover's
flash memory Flash memory is an Integrated circuit, electronic Non-volatile memory, non-volatile computer memory storage medium that can be electrically erased and reprogrammed. The two main types of flash memory, NOR flash and NAND flash, are named for t ...
. It was restored to working condition after deleting unnecessary files. * Japan's '' Hitomi'' astronomical satellite was destroyed on March 26, 2016, when a thruster fired in the wrong direction, causing the spacecraft to spin faster instead of stabilize. * ESA/Roscosmos Schiaparelli Mars lander impacted surface of Mars. Unanticipated spin during descent briefly saturated the IMU, software then misinterpreted the data as showing the lander was underground, so prematurely ejected parachute and shut down engines, resulting in crash. * Israel's first attempt to land an uncrewed spacecraft on the Moon with the '' Beresheet'' was rendered unsuccessful on April 11, 2019, due to a software bug with its engine system, which prevented it from slowing down during its final descent on the Moon's surface. Engineers attempted to correct this bug by remotely rebooting the engine, but by the time they regained control of it, ''Beresheet'' could not slow down in time to avert a hard, crash landing that disintegrated it.


Telecommunications

*
AT&T AT&T Inc., an abbreviation for its predecessor's former name, the American Telephone and Telegraph Company, is an American multinational telecommunications holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the w ...
long-distance network crash (January 15, 1990), in which the failure of one switching system would cause a message to be sent to nearby switching units to tell them that there was a problem. Unfortunately, the arrival of that message would cause those other systems to fail too – resulting in a
cascading failure A cascading failure is a failure in a system of interconnection, interconnected parts in which the failure of one or few parts leads to the failure of other parts, growing progressively as a result of positive feedback. This can occur when a singl ...
that rapidly spread across the entire AT&T long-distance network. * In January 2009,
Google Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
's search engine erroneously notified users that ''every'' web site worldwide was potentially malicious, including its own. * In May 2015,
iPhone The iPhone is a line of smartphones developed and marketed by Apple that run iOS, the company's own mobile operating system. The first-generation iPhone was announced by then–Apple CEO and co-founder Steve Jobs on January 9, 2007, at ...
users discovered a bug where sending a certain sequence of characters and
Unicode Unicode or ''The Unicode Standard'' or TUS is a character encoding standard maintained by the Unicode Consortium designed to support the use of text in all of the world's writing systems that can be digitized. Version 16.0 defines 154,998 Char ...
symbols as a text to another iPhone user would crash the receiving iPhone's SpringBoard interface, and may also crash the entire phone, induce a factory reset, or disrupt the device's connectivity to a significant degree, preventing it from functioning normally. The bug persisted for weeks, gained substantial notoriety and saw a number of individuals using the bug to play pranks on other iOS users, before
Apple An apple is a round, edible fruit produced by an apple tree (''Malus'' spp.). Fruit trees of the orchard or domestic apple (''Malus domestica''), the most widely grown in the genus, are agriculture, cultivated worldwide. The tree originated ...
eventually patched it on June 30, 2015, with iOS 8.4.


Tracking years

* The
year 2000 problem The term year 2000 problem, or simply Y2K, refers to potential computer errors related to the Time formatting and storage bugs, formatting and storage of calendar data for dates in and after the year 2000. Many Computer program, programs repr ...
spawned fears of worldwide economic collapse and an industry of consultants providing last-minute fixes. * A similar problem will occur in 2038 (the
year 2038 problem The year 2038 problem (also known as Y2038, Y2K38, Y2K38 superbug or the Epochalypse) is a time computing problem that leaves some computer systems unable to represent times after 03:14:07 UTC on 19 January 2038. The problem exists in ...
), as many
Unix Unix (, ; trademarked as UNIX) is a family of multitasking, multi-user computer operating systems that derive from the original AT&T Unix, whose development started in 1969 at the Bell Labs research center by Ken Thompson, Dennis Ritchie, a ...
-like systems calculate the time in seconds since 1 January 1970, and store this number as a
32-bit In computer architecture, 32-bit computing refers to computer systems with a processor, memory, and other major system components that operate on data in a maximum of 32- bit units. Compared to smaller bit widths, 32-bit computers can perform la ...
signed
integer An integer is the number zero (0), a positive natural number (1, 2, 3, ...), or the negation of a positive natural number (−1, −2, −3, ...). The negations or additive inverses of the positive natural numbers are referred to as negative in ...
, for which the maximum possible value is (2,147,483,647) seconds. 2,147,483,647 seconds equals 68 years, and 2038 is 68 years forward from 1970. * An error in the payment terminal code for
Bank of Queensland The Bank of Queensland (BOQ), formerly known as the Brisbane Permanent Benefit Building and Investment Society (BPBBIS) between 1874–1970, is an Australian retail bank with headquarters in Brisbane, Queensland. The bank is one of the oldest fi ...
rendered many devices inoperable for up to a week. The problem was determined to be an incorrect hexadecimal number conversion routine. When the device was to tick over to 2010, it skipped six years to 2016, causing terminals to decline customers' cards as expired.


Transportation

* By some accounts Toyota's electronic throttle control system (ETCS) had bugs that could cause sudden unintended acceleration. * The
Boeing 787 Dreamliner The Boeing 787 Dreamliner is an American wide-body airliner developed and manufactured by Boeing Commercial Airplanes. After dropping its unconventional Sonic Cruiser project, Boeing announced the conventional 7E7 on January 29, 2003, wh ...
experienced an
integer overflow In computer programming, an integer overflow occurs when an arithmetic operation on integers attempts to create a numeric value that is outside of the range that can be represented with a given number of digits – either higher than the maximu ...
bug which could shut down all electrical generators if the aircraft were to be kept "on" for more than 248 days. A similar problem was found to exist in the
Airbus A350 The Airbus A350 is a flight length, long-range, wide-body twin-engine airliner developed and produced by Airbus. The initial A350 design proposed in 2004, in response to the Boeing 787 Dreamliner, would have been a development of the Airbu ...
, which needs to be powered down before reaching 149 continuous hours of power-on time, otherwise certain avionics systems or functions would partially or completely fail. * In early 2019, the transportation-rental firm Lime discovered a firmware bug with its electric scooters that can cause them to brake very hard unexpectedly, which may hurl and injure riders. *
Boeing 737 NG The Boeing 737 Next Generation, commonly abbreviated as 737NG, or 737 Next Gen, is a twin-engine narrow-body aircraft produced by Boeing Commercial Airplanes. Launched in 1993 as the third-generation derivative of the Boeing 737, it has been ...
had all cockpit displays go blank if a specific type of instrument approach to any one of seven specific airports was selected in the flight management computer. * Bombardier CRJ-200 equipped with flight management systems by
Collins Aerospace Collins Aerospace is an American technology company that is one of the world's largest suppliers of aerospace and defense products. It was formed in 2018 from the merger of Rockwell Collins and UTC Aerospace Systems. Headquartered in Charlotte, ...
would make wrong turns during
missed approach Missed approach is a procedure followed by a pilot when an instrument approach cannot be completed to a full-stop landing. Initiation A missed approach may be either initiated by the pilot or instructed by air traffic control (ATC). The instru ...
procedures executed by the autopilot in some specific cases when temperature compensation was activated in cold weather.


Video gaming

* '' Eve Online''s deployment of the Trinity patch erased the
boot.ini NTLDR (abbreviation of ''NT loader'') is the Booting, boot loader for all releases of Windows NT operating system from 1993 with the release of Windows NT 3.1 up until Windows XP and Windows Server 2003. From Windows Vista onwards it was replaced b ...
file from several thousand users' computers, rendering them unable to boot. This was due to the usage of a
legacy system Legacy or Legacies may refer to: Arts and entertainment Comics * " Batman: Legacy", a 1996 Batman storyline * '' DC Universe: Legacies'', a comic book series from DC Comics * ''Legacy'', a 1999 quarterly series from Antarctic Press * ''Legacy ...
within the game that was also named boot.ini. As such, the deletion had targeted the wrong directory instead of the /eve directory. * The Corrupted Blood incident was a
software bug A software bug is a design defect ( bug) in computer software. A computer program with many or serious bugs may be described as ''buggy''. The effects of a software bug range from minor (such as a misspelled word in the user interface) to sev ...
in ''
World of Warcraft ''World of Warcraft'' (''WoW'') is a 2004 massively multiplayer online role-playing (MMORPG) video game developed and published by Blizzard Entertainment for Windows and Mac OS X. Set in the '' Warcraft'' fantasy universe, ''World of War ...
'' that caused a deadly, debuff-inducing virtual disease that could only be contracted during a particular
raid RAID (; redundant array of inexpensive disks or redundant array of independent disks) is a data storage virtualization technology that combines multiple physical Computer data storage, data storage components into one or more logical units for th ...
to be set free into the rest of the game world, leading to numerous, repeated deaths of many player characters. This caused players to avoid crowded places in-game, just like in a "real world" epidemic, and the bug became the center of some academic research on the spread of infectious diseases. * On June 6, 2006, the online game ''
RuneScape ''RuneScape'' is a fantasy massively multiplayer online role-playing game (MMORPG) developed and published by Jagex, released in January 2001. ''RuneScape'' was originally a browser game built with the Java (programming language), Java progr ...
'' suffered from a bug that enabled certain player characters to kill and loot other characters, who were unable to fight back against the affected characters because the game still thought they were in player-versus-player mode even after they were kicked out of a combat ring from the house of a player who was suffering from lag while celebrating an in-game accomplishment. Players who were killed by the glitched characters lost many items, and the bug was so devastating that the players who were abusing it were soon tracked down, caught and banned permanently from the game, but not before they had laid waste to the region of Falador, thus christening the bug "Falador Massacre". * In the 256th level of ''
Pac-Man ''Pac-Man,'' originally called in Japan, is a 1980 maze video game developed and published by Namco for arcades. In North America, the game was released by Midway Manufacturing as part of its licensing agreement with Namco America. The pla ...
'', a bug results in a kill screen. The maximum number of fruit available is seven and when that number rolls over, it causes the entire right side of the screen to become a jumbled mess of symbols while the left side remains normal. * Upon initial release, the
ZX Spectrum The ZX Spectrum () is an 8-bit computing, 8-bit home computer developed and marketed by Sinclair Research. One of the most influential computers ever made and one of the all-time bestselling British computers, over five million units were sold. ...
game ''
Jet Set Willy ''Jet Set Willy'' is a platform video game written by Matthew Smith for the ZX Spectrum home computer. It was published in 1984 by Software Projects and ported to most home computers of the time. The game is a sequel to '' Manic Miner'' pub ...
'' was impossible to complete because of a severe bug that corrupted the game data, causing enemies and the player character to be killed in certain rooms of the large mansion where the entire game takes place. The bug, known as "The Attic Bug", would occur when the player entered the mansion's attic, which would then cause an arrow to travel offscreen, overwriting the contents of memory and altering crucial variables and behavior in an undesirable way. The game's developers initially excused this bug by claiming that the affected rooms were death traps, but ultimately owned up to it and issued instructions to players on how to fix the game itself. * One of the free demo discs issued to '' PlayStation Underground'' subscribers in the United States contained a serious bug, particularly in the demo for '' Viewtiful Joe 2'', that would not only crash the
PlayStation 2 The PlayStation 2 (PS2) is a home video game console developed and marketed by Sony Interactive Entertainment, Sony Computer Entertainment. It was first released in Japan on 4 March 2000, in North America on 26 October, in Europe on 24 Novembe ...
, but would also unformat any
memory card A memory card is an electronic data storage device used for storing digital information, typically using flash memory. These are commonly used in digital portable electronic devices, such as digital cameras as well as in many early games conso ...
s that were plugged into that console, erasing any and all saved data onto them. The bug was so severe that Sony had to apologize for it and send out free copies of other PS2 games to affected players as consolation. * Due to a severe programming error, much of the
Nintendo DS The is a foldable handheld game console produced by Nintendo, released globally across 2004 and 2005. The DS, an initialism for "Developers' System" or "Dual Screen", introduced distinctive new features to handheld games: two LCD screens worki ...
game '' Bubble Bobble Revolution'' is unplayable because a mandatory boss fight failed to trigger in the 30th level. * An update for the
Xbox 360 The Xbox 360 is a home video game console developed by Microsoft. As the successor to the Xbox (console), original Xbox, it is the second console in the Xbox#Consoles, Xbox series. It was officially unveiled on MTV on May 12, 2005, with detail ...
version of ''
Guitar Hero II ''Guitar Hero II'' is a 2006 rhythm game developed by Harmonix and published by RedOctane for the PlayStation 2 and Activision for the Xbox 360. It is the sequel to ''Guitar Hero (video game), Guitar Hero'' (2005) and the second installment in t ...
'', which was intended to fix some issues with the whammy bar on that game's guitar controllers, came with a bug that caused some consoles to freeze, or even stop working altogether, producing the infamous " red ring of death". *
Valve A valve is a device or natural object that regulates, directs or controls the flow of a fluid (gases, liquids, fluidized solids, or Slurry, slurries) by opening, closing, or partially obstructing various passageways. Valves are technically Pip ...
's
Steam Steam is water vapor, often mixed with air or an aerosol of liquid water droplets. This may occur due to evaporation or due to boiling, where heat is applied until water reaches the enthalpy of vaporization. Saturated or superheated steam is inv ...
client for Linux could accidentally delete all the user's files in every directory on the computer. This happened to users that had moved Steam's installation directory. The bug is the result of unsafe shellscript programming: STEAMROOT="$(cd "$" && echo $PWD)" # Scary! rm -rf "$STEAMROOT/"* The first line tries to find the script's containing directory. This could fail, for example if the directory was moved while the script was running, invalidating the "selfpath" variable $0. It would also fail if $0 contained no slash character, or contained a broken symlink, perhaps mistyped by the user. The way it would fail, as ensured by the && conditional, and not having set -e cause termination on failure, was to produce the empty string. This
failure mode Failure causes are defects in design, process, quality, or part application, which are the underlying cause of a failure or which initiate a process which leads to failure. Where failure depends on the user of the product or process, then human er ...
was not checked, only commented as "Scary!". Finally, in the deletion command, the slash character takes on a very different meaning from its role of path concatenation operator when the string before it is empty, as it then names the
root directory In a Computing, computer file system, and primarily used in the Unix and Unix-like operating systems, the root directory is the first or top-most Directory (computing), directory in a hierarchy. It can be likened to the trunk of a Tree (data st ...
. * Minus World is an infamous glitch
level Level or levels may refer to: Engineering *Level (optical instrument), a device used to measure true horizontal or relative heights * Spirit level or bubble level, an instrument designed to indicate whether a surface is horizontal or vertical *C ...
from the 1985 game '' Super Mario Bros.'', accessed by using a bug to clip through walls in level 1–2 to reach its " warp zone", which leads to the said level. As this level is endless, triggering the bug that takes the player there will make the game impossible to continue until the player resets the game or runs out of
lives Lives may refer to: * The plural form of a ''life'' * Lives, Iran, a village in Khuzestan Province, Iran * The number of lives in a video game * ''Parallel Lives'', aka ''Lives of the Noble Greeks and Romans'', a series of biographies of famous m ...
. *" MissingNo." is a glitch
Pokémon is a Japanese media franchise consisting of List of Pokémon video games, video games, Pokémon (TV series), animated series and List of Pokémon films, films, Pokémon Trading Card Game, a trading card game, and other related media. The fran ...
species present in ''Pokémon Red'' and ''Blue'', which can be encountered by performing a particular sequence of seemingly unrelated actions. Capturing this Pokémon may corrupt the game's data, according to Nintendo and some of the players who successfully attempted this glitch. This is one of the most famous bugs in video game history, and continues to be well-known.


See also

* London Ambulance Service § Innovation


References

{{reflist, 30em


External links


Forum on Risks to the Public in Computers and Related Systems
! Software quality Software testing Quality assurance