List of software bugs

From HandWiki
Short description: none

Many software bugs are merely annoying or inconvenient, but some can have extremely serious consequences—either financially or as a threat to human well-being.[1] The following is a list of software bugs with significant consequences.

Space

  • A booster went off course during launch, resulting in the destruction of NASA Mariner 1. This was the result of the failure of a transcriber to notice an overbar in a written specification for the guidance program, resulting in the coding of an incorrect formula in its FORTRAN software. (July 22, 1962).[2] The initial reporting of the cause of this bug was incorrect.[3]
  • NASA's 1965 Gemini 5 mission landed 80 miles (130 km) short of its intended splashdown point when the pilot compensated manually for an incorrect constant for the Earth's rotation rate. A 360-degree rotation corresponding to the Earth's rotation relative to the fixed stars was used instead of the 360.98-degree rotation in a 24-hour solar day. The shorter length of the first three missions and a computer failure on Gemini 4 prevented the bug from being detected earlier.[4]
  • The Russian Space Research Institute's Phobos 1 (Phobos program) deactivated its attitude thrusters and could no longer properly orient its solar arrays or communicate with Earth, eventually depleting its batteries. (September 10, 1988).[5]
  • The European Space Agency's Ariane flight V88 was destroyed 40 seconds after takeoff (June 4, 1996). The first flight of the US$1 billion Ariane V rocket self-destructed due to an overflow occurring during a floating-point to integer conversion in the on-board guidance software. The same software had been used successfully in the Ariane IV program, but the Ariane V produced larger values for some variable, causing the overflow.[6][7]
  • In 1997, the Mars Pathfinder mission was jeopardised by a bug in concurrent software shortly after the rover landed, which was found in preflight testing but given a low priority as it only occurred in certain unanticipated heavy-load conditions.[8] The problem, which was identified and corrected from Earth, was due to computer resets caused by priority inversion.[9]
  • In 2000, a Zenit 3SL launch failed due to faulty ground software not closing a valve in the rocket's second stage pneumatic system.[10]
  • The European Space Agency's CryoSat-1 satellite was lost in a launch failure in 2005 due to a missing shutdown command in the flight control system of its Rokot carrier rocket.[11]
  • NASA Mars Polar Lander was destroyed because its flight software mistook vibrations caused by the deployment of the stowed legs for evidence that the vehicle had landed and shut off the engines 40 meters from the Martian surface (December 3, 1999).[12]
  • Its sister spacecraft Mars Climate Orbiter was also destroyed, due to software on the ground generating commands based on parameters in pound-force (lbf) rather than newtons (N).
  • A mis-sent command from Earth caused the software of the NASA Mars Global Surveyor to incorrectly assume that a motor had failed, causing it to point one of its batteries at the sun. This caused the battery to overheat (November 2, 2006).[13][14]
  • NASA's Spirit rover became unresponsive on January 21, 2004, a few weeks after landing on Mars. Engineers found that too many files had accumulated in the rover's flash memory. It was restored to working condition after deleting unnecessary files.[15]
  • Japan's Hitomi astronomical satellite was destroyed on March 26, 2016, when a thruster fired in the wrong direction, causing the spacecraft to spin faster instead of stabilize.[16]
  • Israel's first attempt to land an uncrewed spacecraft on the Moon with the Beresheet was rendered unsuccessful on April 11, 2019, due to a software bug with its engine system, which prevented it from slowing down during its final descent on the Moon's surface. Engineers attempted to correct this bug by remotely rebooting the engine, but by the time they regained control of it, Beresheet could not slow down in time to avert a hard, crash landing that disintegrated it.[17]

Medical

  • A bug in the code controlling the Therac-25 radiation therapy machine was directly responsible for at least five patient deaths in the 1980s when it administered excessive quantities of beta radiation.[18][19][20]
  • Radiation therapy planning software RTP/2 created by Multidata Systems International could incorrectly double the dosage of radiation depending on how the technician entered data into the machine. At least eight patients died, while another 20 received overdoses likely to cause significant health problems (November 2000).[21] See also Instituto Oncológico Nacional#Accident
  • A Medtronic heart device was found vulnerable to remote attacks (2008-03).[22]
  • The Becton Dickinson Alaris Gateway Workstation allows unauthorized arbitrary remote execution (2019).[23][24]
  • The CareFusion Alaris pump module (8100) will not properly delay an Infusion when the "Delay Until" option or "Multidose" feature is used (2015).[25]

Tracking years

Main page: Time formatting and storage bugs
  • The year 2000 problem spawned fears of worldwide economic collapse and an industry of consultants providing last-minute fixes.[26]
  • A similar problem will occur in 2038 (the year 2038 problem), as many Unix-like systems calculate the time in seconds since 1 January 1970, and store this number as a 32-bit signed integer, for which the maximum possible value is 231 − 1 (2,147,483,647) seconds.[27]
  • An error in the payment terminal code for Bank of Queensland rendered many devices inoperable for up to a week. The problem was determined to be an incorrect hexadecimal number conversion routine. When the device was to tick over to 2010, it skipped six years to 2016, causing terminals to decline customers' cards as expired.[28]

Electric power transmission

Administration

  • The software of the A2LL system for handling unemployment and social services in Germany presented several errors with large-scale consequences, such as sending the payments to invalid account numbers in 2004.[citation needed]

Telecommunications

  • AT&T long-distance network crash (January 15, 1990), in which the failure of one switching system would cause a message to be sent to nearby switching units to tell them that there was a problem. Unfortunately, the arrival of that message would cause those other systems to fail too – resulting in a cascading failure that rapidly spread across the entire AT&T long-distance network.[30][31]
  • In January 2009, Google's search engine erroneously notified users that every web site worldwide was potentially malicious, including its own.[32]
  • In May 2015, iPhone users discovered a bug where sending a certain sequence of characters and Unicode symbols as a text to another iPhone user would crash the receiving iPhone's SpringBoard interface,[33] and may also crash the entire phone, induce a factory reset, or disrupt the device's connectivity to a significant degree,[34] preventing it from functioning normally. The bug persisted for weeks, gained substantial notoriety and saw a number of individuals using the bug to play pranks on other iOS users,[citation needed] before Apple eventually patched it on June 30, 2015, with iOS 8.4.

Military

  • The software error of a MIM-104 Patriot caused its system clock to drift by one third of a second over a period of one hundred hours – resulting in failure to locate and intercept an incoming Iraqi Al Hussein missile, which then struck Dharan barracks, Saudi Arabia (February 25, 1991), killing 28 Americans.[35][36]
  • A Royal Air Force Chinook helicopter crashed into the Mull of Kintyre in June 1994, killing 29. Initially, the crash was dismissed as pilot error, but an investigation by Computer Weekly uncovered sufficient evidence to convince a House of Lords inquiry that it may have been caused by a software bug in the aircraft's engine control computer.[37]
  • Smart ship USS Yorktown was left dead in the water in September 1997 for nearly 3 hours after a divide by zero error.[38]
  • In April 1992 the first Lockheed YF-22 crashed while landing at Edwards Air Force Base, California. The cause of the crash was found to be a flight control software error that failed to prevent a pilot-induced oscillation.[39]
  • While attempting its first overseas deployment to the Kadena Air Base in Okinawa, Japan, on 11 February 2007, a group of six F-22 Raptors flying from Hickam AFB, Hawaii, experienced multiple computer crashes coincident with their crossing of the 180th meridian of longitude (the International Date Line). The computer failures included at least navigation (completely lost) and communication. The fighters were able to return to Hawaii by following their tankers, something that might have been problematic had the weather not been good. The error was fixed within 48 hours, allowing a delayed deployment.[40]

Media

  • In the Sony BMG copy protection rootkit scandal (October 2005), Sony BMG produced a Van Zant music CD that employed a copy protection scheme that covertly installed a rootkit on any Windows PC that was used to play it. Their intent was to hide the copy protection mechanism to make it harder to circumvent. Unfortunately, the rootkit inadvertently opened a security hole resulting in a wave of successful trojan horse attacks on the computers of those who had innocently played the CD.[41] Sony's subsequent efforts to provide a utility to fix the problem actually exacerbated it.[42]

Video gaming

  • Eve Online's deployment of the Trinity patch erased the boot.ini file from several thousand users' computers, rendering them unable to boot. This was due to the usage of a legacy system within the game that was also named boot.ini. As such, the deletion had targeted the wrong directory instead of the /eve directory.[43]
  • The Corrupted Blood incident was a software bug in World of Warcraft that caused a deadly, debuff-inducing virtual disease that could only be contracted during a particular raid to be set free into the rest of the game world, leading to numerous, repeated deaths of many player characters. This caused players to avoid crowded places in-game, just like in a "real world" epidemic, and the bug became the center of some academic research on the spread of infectious diseases.[44]
  • On June 6, 2006, the online game RuneScape suffered from a bug that enabled certain player characters to kill and loot other characters, who were unable to fight back against the affected characters because the game still thought they were in player-versus-player mode even after they were kicked out of a combat ring from the house of a player who was suffering from lag while celebrating an in-game accomplishment. Players who were killed by the glitched characters lost many items, and the bug was so devastating that the players who were abusing it were soon tracked down, caught and banned permanently from the game, but not before they had laid waste to the region of Falador, thus christening the bug "Falador Massacre".[45]
  • In the 256th level of Pac-Man, a bug results in a kill screen. The maximum number of fruit available is seven and when that number rolls over, it causes the entire right side of the screen to become a jumbled mess of symbols while the left side remains normal.[46]
  • Upon initial release, the ZX Spectrum game Jet Set Willy was impossible to complete because of a severe bug that corrupted the game data, causing enemies and the player character to be killed in certain rooms of the large mansion where the entire game takes place.[47] The bug, known as "The Attic Bug", would occur when the player entered the mansion's attic, which would then cause an arrow to travel offscreen, overwriting the contents of memory and altering crucial variables and behavior in an undesirable way. The game's developers initially excused this bug by claiming that the affected rooms were death traps, but ultimately owned up to it and issued instructions to players on how to fix the game itself.[48]
  • One of the free demo discs issued to PlayStation Underground subscribers in the United States contained a serious bug, particularly in the demo for Viewtiful Joe 2, that would not only crash the PlayStation 2, but would also unformat any memory cards that were plugged into that console, erasing any and all saved data onto them.[49] The bug was so severe that Sony had to apologize for it and send out free copies of other PS2 games to affected players as consolation.[50]
  • Due to a severe programming error, much of the Nintendo DS game Bubble Bobble Revolution is unplayable because a mandatory boss fight failed to trigger in the 30th level.[51]
  • An update for the Xbox 360 version of Guitar Hero II, which was intended to fix some issues with the whammy bar on that game's guitar controllers, came with a bug that caused some consoles to freeze, or even stop working altogether, producing the infamous "red ring of death".[52]
  • Valve's Steam client for Linux could accidentally delete all the user's files in every directory on the computer. This happened to users that had moved Steam's installation directory.[53] The bug is the result of unsafe shellscript programming:
    STEAMROOT="$(cd "${0%/*}" && echo $PWD)"

# Scary! rm -rf "$STEAMROOT/"* The first line tries to find the script's containing directory. This could fail, for example if the directory was moved while the script was running, invalidating the "selfpath" variable $0. It would also fail if $0 contained no slash character, or contained a broken symlink, perhaps mistyped by the user. The way it would fail, as ensured by the && conditional, and not having set -e cause termination on failure, was to produce the empty string. This failure mode was not checked, only commented as "Scary!". Finally, in the deletion command, the slash character takes on a very different meaning from its role of path concatenation operator when the string before it is empty, as it then names the root directory.

  • Minus World is an infamous glitch level from the 1985 game Super Mario Bros., accessed by using a bug to clip through walls in level 1–2 to reach its "warp zone", which leads to the said level.[54] As this level is endless, triggering the bug that takes the player there will make the game impossible to continue until the player resets the game or runs out of lives.
  • "MissingNo." is a glitch Pokémon species present in Pokémon Red and Blue, which can be encountered by performing a particular sequence of seemingly unrelated actions. Capturing this Pokémon may corrupt the game's data, according to Nintendo[55][56][57] and some of the players who successfully attempted this glitch. This is one of the most famous bugs in video game history, and continues to be well-known.[58]

Encryption

See also Category:Computer security exploits

  • In order to fix a warning issued by Valgrind, a maintainer of Debian patched OpenSSL and broke the random number generator in the process. The patch was uploaded in September 2006 and made its way into the official release; it was not reported until April 2008. Every key generated with the broken version is compromised (as the "random" numbers were made easily predictable), as is all data encrypted with it, threatening many applications that rely on encryption such as S/MIME, Tor, SSL or TLS protected connections and SSH.[59]
  • Heartbleed, an OpenSSL vulnerability introduced in 2012 and disclosed in April 2014, removed confidentiality from affected services, causing among other things the shut down of the Canada Revenue Agency's public access to the online filing portion of its website[60] following the theft of social insurance numbers.[61]
  • The Apple "goto fail" bug was a duplicated line of code which caused a public key certificate check to pass a test incorrectly.
  • The GnuTLS "goto fail" bug was similar to the Apple bug and found about two weeks later. The GnuTLS bug also allowed attackers to bypass SSL/TLS security. [62]

Transportation

  • By some accounts Toyota's electronic throttle control system (ETCS) had bugs that could cause sudden unintended acceleration.[63]
  • The Boeing 787 Dreamliner experienced an integer overflow bug which could shut down all electrical generators if the aircraft was on for more than 248 days.[64] A similar problem was found in Airbus A350 which need to be powered down before reaching 149 hours of continuous power-on time, otherwise certain avionics systems or functions would partially or completely fail.[65]
  • In early 2019, the transportation-rental firm Lime discovered a firmware bug with its electric scooters that can cause them to brake very hard unexpectedly, which may hurl and injure riders.[66]
  • Boeing 737 NG had all cockpit displays go blank if a specific type of instrument approach to any one of seven specific airports was selected in the flight management computer.[67]
  • Bombardier CRJ-200 equipped with flight management systems by Collins Aerospace would make wrong turns during missed approach procedures executed by the autopilot in some specific cases when temperature compensation was activated in cold weather.[68]
  • In June 1996, Ariane flight V88 failed less than a minute after launch, because the horizontal bias value was too big for a 16 bit register.

Finance

  • The Vancouver Stock Exchange index had large errors due to repeated rounding. In January 1982 the index was initialized at 1000 and subsequently updated and truncated to three decimal places on each trade. This was done about 3000 times a day. The accumulated truncations led to an erroneous loss of around 25 points per month. Over the weekend of November 25–28, 1983, the error was corrected, raising the value of the index from its Friday closing figure of 524.811 to 1098.892.[69][70]
  • Knight Capital Group lost $440 million in 45 minutes due to the improper deployment of software on servers and the re-use of a critical software flag that caused old unused software code to execute during trading.[71]
  • The British Post Office scandal; between 2000 and 2015, 736 subpostmasters were prosecuted by the UK Post Office, with many falsely convicted and sent to prison. The subpostmasters were blamed for financial shortfalls which actually were caused by software defects in the Post Office's Horizon accounting software.[72]

Blockchain

  • The DAO bug. On June 17, 2016, the DAO was subjected to an attack exploiting a combination of vulnerabilities, including the one concerning recursive calls, that resulted in the transfer of 3.6 million Ether – around a third of the 11.5 million Ether that had been committed to The DAO – valued at the time at around $50M.[73][74]

See also

  • London Ambulance Service § Innovation

References

  1. "Why Software fails" (in en). 2 September 2005. https://spectrum.ieee.org/computing/software/why-software-fails. 
  2. "Space FAQ 08/13 - Planetary Probe History". 17 Sep 1996. http://www.faqs.org/faqs/space/probe/. 
  3. Hoare, C. A. R.. Hints on Programming Language Design.  in Sigact/Sigplan Symposium on Principles of Programming Languages. October 1973. , reprinted in Horowitz. Programming Languages, A Grand Tour, 3rd ed. . See "Mariner 1". RISKS Digest 9 (54). 12 Dec 1989. http://catless.ncl.ac.uk/Risks/9.54.html#subj1.  and Neumann, Peter G. (30 May 1989). "Mariner I -- no holds BARred". The RISKS Digest 8 (75). http://catless.ncl.ac.uk/Risks/8.75.html#subj1. Retrieved 2008-01-07. 
  4. "Gemini 5". http://www.hq.nasa.gov/office/pao/History/SP-4203/ch11-4.htm. 
  5. Sagdeev, R. Z.; Zakharov, A. V. (1989). "Brief history of the Phobos mission". Nature 341 (6243): 581–585. doi:10.1038/341581a0. Bibcode1989Natur.341..581S. 
  6. Dowson, M. (March 1997). "The Ariane 5 Software Failure". Software Engineering Notes 22 (2): 84. doi:10.1145/251880.251992. 
  7. "Design by Contract: The Lessons of Ariane". IEEE Computer 30 (1): 129–130. January 1997. doi:10.1109/2.562936. http://se.ethz.ch/~meyer/publications/computer/ariane.pdf. 
  8. Heaven, Douglas (2013). "Parallel sparking: Many chips make light work". New Scientist (Elsevier BV) 219 (2930): 42–45. doi:10.1016/s0262-4079(13)62046-1. ISSN 0262-4079. https://www.newscientist.com/article/mg21929301.000-parallel-sparking-many-chips-make-light-work.html?page=2. 
  9. Reeves, Glenn E (15 Dec 1997). "What really happened on Mars? -- Authoritative Account". http://research.microsoft.com/en-us/um/people/mbj/Mars_Pathfinder/Authoritative_Account.html. 
  10. "Spaceflight Now | Breaking News | Sea Launch malfunction blamed on software glitch". https://spaceflightnow.com/sealaunch/ico1/000330software.html. Retrieved January 2, 2022. 
  11. "CryoSat Mission lost due to launch failure". European Space Agency. 8 October 2005. http://www.esa.int/esaCP/SEMR3Q5Y3EE_index_0.html. 
  12. "Mars Polar Lander". http://solarsystem.nasa.gov/missions/profile.cfm?MCode=MPL. 
  13. "Report Reveals Likely Causes of Mars Spacecraft Loss". http://www.nasa.gov/mission_pages/mgs/mgs-20070413.html. 
  14. "Faulty Software May Have Doomed Mars Orbiter". Space.com. http://www.space.com/news/070110_mgs_softwareglitch.html/. 
  15. "Out of memory problem caused Mars rover's glitch". February 3, 2004. http://www.computerworld.com/s/article/89829/Out_of_memory_problem_caused_Mars_rover_s_glitch. 
  16. Witze, Alexandra (2016). "Software error doomed Japanese Hitomi spacecraft". Nature 533 (7601): 18–19. doi:10.1038/nature.2016.19835. PMID 27147012. Bibcode2016Natur.533...18W. 
  17. Weitering, Hanneke (12 April 2019). "Israeli Moon Lander Suffered Engine Glitch Before Crash". https://www.space.com/beresheet-moon-crash-engine-glitch.html. 
  18. "The Therac-25 Accidents (PDF), by Nancy Leveson". http://sunnyday.mit.edu/papers/therac.pdf. 
  19. "An Investigation of the Therac-25 Accidents (IEEE Computer)". http://courses.cs.vt.edu/~cs3604/lib/Therac_25/Therac_1.html. 
  20. "Computerized Radiation Therapy (PDF) reported by TROY GALLAGHER". http://radonc.wdfiles.com/local--files/radiation-accident-therac25/Therac_UGuelph_TGall.pdf. 
  21. Garfinkel, Simson (November 8, 2005). "History's Worst Software Bugs". https://www.wired.com/2005/11/historys-worst-software-bugs/. 
  22. Feder, Barnaby J. (2008-03-12). "A Heart Device Is Found Vulnerable to Hacker Attacks". The New York Times. https://www.nytimes.com/2008/03/12/business/12heart-web.html. 
  23. "ICS Advisory (ICSMA-19-164-01)" (Press release). Cybersecurity and Infrastructure Security Agency. 2019-06-13. Retrieved 2019-11-15.
  24. Newman, Lily Hay (2019-10-01). "Decades-Old Code Is Putting Millions of Critical Devices at Risk". Wired. https://www.wired.com/story/urgent-11-ipnet-vulnerable-devices/. Retrieved 2019-11-15. 
  25. "Urgent: Medical Device Recall Notification, AFFECTED DEVICE: Alaris® Pump module (Model 8100)"Delay Until" Option and "Multidose" Feature" (PDF) (Press release). CareFusion. 2014-04-23. Archived from the original (PDF) on 2015-06-12. Retrieved 2019-11-15.
  26. "Looking at the Y2K bug, portal on CNN.com". http://www.cnn.com/TECH/specials/y2k/. 
  27. "The year 2038 bug". http://www.2038bug.com/. 
  28. Stafford, Patrick. "Businesses hit by Bank of Queensland EFTPOS bug". http://www.smartcompany.com.au/growth/economy/12681-20100104-businesses-hit-by-bank-of-queensland-eftpos-bug.html. 
  29. "Software Bug Contributed to Blackout". http://www.securityfocus.com/news/8016. 
  30. Sterling, Bruce (1993). The Hacker Crackdown: Law and Disorder on the Electronic Frontier. Spectra Books. ISBN 0-553-56370-X. 
  31. "The Crash of the AT&T Network in 1990". http://www.phworld.org/history/attcrash.htm. 
  32. Metz, Cade (January 31, 2009). "Google mistakes entire web for malware". https://www.theregister.co.uk/2009/01/31/google_malware_snafu/. 
  33. "Bug in iOS Unicode handling crashes iPhones with a simple text". Apple Insider. 26 May 2015. http://appleinsider.com/articles/15/05/26/bug-in-ios-notifications-handling-crashes-iphones-with-a-simple-text. 
  34. Clover, Juli (26 May 2015). "New iOS Bug Crashing iPhones Simply by Receiving a Text Message". MacRumors. http://www.macrumors.com/2015/05/26/ios-bug-crashing-iphones-with-text-message/. 
  35. "Patriot missile defense, Software problem led to system failure at Dharhan, Saudi Arabia; GAO report IMTEC 92-26". US Government Accounting Office. http://www.gao.gov/products/IMTEC-92-26. 
  36. Skeel, Robert. "Roundoff Error and the Patriot Missile". http://www.mc.edu/campus/users/travis/syllabi/381/patriot.htm. 
  37. Rogerson, Simon (April 2002). "The Chinook Helicopter Disaster". IMIS Journal 12 (2). http://www.ccsr.cse.dmu.ac.uk/resources/general/ethicol/Ecv12no2.html. 
  38. "Software glitches leave Navy Smart Ship dead in the water". 13 Jul 1998. http://www.gcn.com/17_17/news/33727-1.html. 
  39. "F/A-22 Program History". http://www.f-22raptor.com/index_airframe.php#1992. 
  40. "Lockheed's F-22 Raptor Gets Zapped by International Date Line". 26 Feb 2007. http://www.dailytech.com/article.aspx?newsid=6225. 
  41. Borland, John (November 11, 2005). "FAQ: Sony's 'rootkit' CDs - CNET News". http://www.news.com/FAQ-Sonys-rootkit-CDs/2100-1029_3-5946760.html. 
  42. Russinovich, Mark (4 Nov 2005). "Mark's Blog : More on Sony: Dangerous Decloaking Patch, EULAs and Phoning Home". http://blogs.technet.com/markrussinovich/archive/2005/11/04/more-on-sony-dangerous-decloaking-patch-eulas-and-phoning-home.aspx. 
  43. "About the boot.ini issue (Dev Blog)". http://community.eveonline.com/news/dev-blogs/about-the-boot.ini-issue/. 
  44. Balicer, Ran (2005-10-05). "Modeling Infectious Diseases Dissemination Through Online Role-Playing Games". Epidemiology 18 (2): 260–261. doi:10.1097/01.ede.0000254692.80550.60. PMID 17301707. 
  45. Bishop, Sam (8 June 2016). "Runescape marks the anniversary of the Falador Massacre". https://www.gamereactor.eu/news/425783/Runescape+marks+the+anniversary+of+the+Falador+Massacre/. 
  46. "Pac Man'S Split Screen Level Analyzed And Fixed". Donhodges.Com. http://www.donhodges.com/how_high_can_you_get2.htm. 
  47. Langshaw, Mark (30 September 2010). "Retro Corner: 'Jet Set Willy' (Spectrum)". http://www.digitalspy.com/gaming/retro-gaming/news/a279265/retro-corner-jet-set-willy-spectrum/. 
  48. "Jet Set Willy Solved!". Personal Computer Games (8): 21. July 1984. https://archive.org/stream/personalcomputergames-magazine-08/PersonalComputerGames_08#page/n22/mode/1up. Retrieved 2014-04-19. 
  49. Krotoski, Aleks (2004-11-30). "Viewtiful Joe 2 demo deletes memory cards". The Guardian. https://www.theguardian.com/technology/gamesblog/2004/nov/30/viewtifuljoe2. 
  50. Bramwell, AleksTom (2004-12-07). "Sony to replace defective demo discs with games". http://www.eurogamer.net/articles/news071204sonydemodisc. 
  51. "Bubble Bobble Revolution DS production issues confirmed *UPDATE*". 14 Oct 2006. https://gonintendo.com/?p=6805. 
  52. Bramwell, Tom (2007-04-16). "RedOctane admits to Guitar Hero II patch problem". http://www.eurogamer.net/articles/redoctane-admits-to-guitar-hero-ii-patch-problem. 
  53. Paul, Ian (17 Jan 2015). "Scary Steam for Linux bug erases all the personal files on your PC". https://www.pcworld.com/article/2871653/scary-steam-for-linux-bug-erases-all-the-personal-files-on-your-pc.html. 
  54. Gach, Ethan (14 November 2016). "The NES Classic Carries Over Classic Glitches". https://www.kotaku.com.au/2016/11/the-nes-classic-carries-over-classic-glitches/. 
  55. Nintendo. "Customer Service — Specific GamePak Troubleshooting". https://www.nintendo.com/consumer/systems/gameboy/trouble_specificgame.jsp#missingno. 
  56. "Pokechat". Nintendo Power 120: 101. May 1999. 
  57. Loe, Casey (1999). Pokémon Perfect Guide Includes Red-Yellow-Blue. Versus Books. p. 125. ISBN 1-930206-15-1. 
  58. "Gaming's Top 10 Easter Eggs". IGN Entertainment. April 9, 2009. p. 2. http://games.ign.com/articles/971/971383p2.html. 
  59. "DSA-1571-1 openssl -- predictable random number generator". http://www.debian.org/security/2008/dsa-1571. 
  60. "Heartbleed bug may shut Revenue Canada website until weekend". CBC News. 2014-04-09. http://www.cbc.ca/news/business/revenue-canada-shuts-website-to-head-off-heartbleed-bug-1.2603742. 
  61. "Heartbleed bug: 900 SINs stolen from Revenue Canada - Business - CBC News". CBC News. http://www.cbc.ca/news/business/heartbleed-bug-900-sins-stolen-from-revenue-canada-1.2609192. 
  62. Goodin, Dan (March 4, 2014). "Critical crypto bug leaves Linux, hundreds of apps open to eavesdropping". Ars Technica. https://arstechnica.com/information-technology/2014/03/critical-crypto-bug-leaves-linux-hundreds-of-apps-open-to-eavesdropping/. 
  63. Dunn, Michael (28 Oct 2013). "Toyota's killer firmware: Bad design and its consequences". https://www.edn.com/toyotas-killer-firmware-bad-design-and-its-consequences/. 
  64. "To keep a Boeing Dreamliner flying, reboot once every 248 days". 1 Apr 2015. https://www.engadget.com/2015-05-01-boeing-787-dreamliner-software-bug.html. 
  65. Corfield, Gareth (25 Jul 2019). "Airbus A350 software bug forces airlines to turn planes off and on every 149 hours". https://www.theregister.com/2019/07/25/a350_power_cycle_software_bug_149_hours/. 
  66. Roy, Eleanor Ainge (21 February 2019). "Auckland threatens to eject Lime scooters after wheels lock at high speed". The Guardian. https://www.theguardian.com/world/2019/feb/21/auckland-threatens-to-eject-lime-scooters-after-wheels-lock-at-high-speed. 
  67. Corfield, Gareth (8 Jan 2020). "Blackout Bug: Boeing 737 cockpit screens go blank if pilots land on specific runways". https://www.theregister.com/2020/01/08/boeing_737_ng_cockpit_screen_blank_bug/. 
  68. Corfield, Gareth (29 May 2020). "Software bug in Bombardier airliner made planes turn the wrong way". https://www.theregister.com/2020/05/29/bombardier_missed_approach_bug/. 
  69. Quinn, Kevin (November 8, 1983). "Ever Had Problems Rounding Off Figures? This Stock Exchange Has". The Wall Street Journal: p. 37. 
  70. Wayne, Lilley (November 29, 1983). "Vancouver stock index has right number at last". The Toronto Star. 
  71. Popper, Nathaniel (2 August 2012). "Knight Capital Says Trading Glitch Cost It $440 Million". https://dealbook.nytimes.com/2012/08/02/knight-capital-says-trading-mishap-cost-it-440-million. 
  72. Flinders, Karl (3 March 2022). "Post Office warned of software flaw in 2006, but failed to alert subpostmaster network.". https://www.computerweekly.com/news/252514110/Post-Office-warned-of-software-flaw-in-2006-but-failed-to-alert-subpostmaster-network. 
  73. Popper, Nathaniel (17 June 2016). "Hacker May Have Taken $50 Million From Cybercurrency Project". The New York Times. https://www.nytimes.com/2016/06/18/business/dealbook/hacker-may-have-removed-more-than-50-million-from-experimental-cybercurrency-project.html. 
  74. Price, Rob (17 June 2016). "Digital currency Ethereum is cratering amid claims of a $50 million hack". http://uk.businessinsider.com/dao-hacked-ethereum-crashing-in-value-tens-of-millions-allegedly-stolen-2016-6. 

External links