Angband Bugreports |
If you find a bug then report it to me at rr9@thangorodrim.net. I can't fix the bug if I don't know of it.
You should include the following informations in your bugreports:
|
Description: Avavir has the ACTIVATE flag but no "A:" activation line.
Fix (14th September 2000): avavir_activation.diff
Description: There is a bug in one of Chris Weisiger's new vaults: number 30, "Bubbles". The two "bubbles" in the bottom right corner are inaccessible, and surrounded entirely by permanent rock. This should obviously not be the case. This can be checked by (a) changing the colour of permanent rock so it is not the same colour as normal granite, and (b) then wizard-lighting the level with (CTRL-A)+W.
Fix (14th September 2000): bubbles_vault.diff
Description: Looking at init1.c and the parsing of the p_info.txt file, it appears that the code for checking the "I:" lines is duplicated.
Fix (14th September 2000): recall_ironman.diff
Fix (14th September 2000): random_class.diff
Fix (14th September 2000): genocide_activation.diff
Fix (14th September 2000): immunity_flags.diff
Fix (15th September 2000): store_flavor.diff
Fix (17th September 2000): indestructible_artifact.diff
Description: Loading the *.bmp files fails with the message "Incorrect BMP file format" on various types of Unix machines. This problem is caused by some code in maid-x11.c that depends heavily on a specific byte order, size of variables, and internal layout of structs.
Fix (17th September 2000): bitmap_loading.diff
Description: The code for the parsing of command-line parameters contains a bug that allows a buffer overflow attack. This enables malicious users on multi-user systems where Angband runs setuid or setgid to get access as the owner of the executable (usually this is user "games"). Update: The "ANGBAND_PATH" environment-variable also allows a buffer-overflow attack.
Fix (7th October 2000): security_problem.diff
Fix (7th October 2000): big_windows.diff
Description: The code for the parsing of a pref-file line doesn't check for negative indices for objects, monsters, features, and other things. This allows the user to directly write to the memory of the program and can be abused by malicious users to get get access as the owner of the executable (usually this is user "games") on multi-user systems where Angband runs setuid or setgid.
Fix (7th October 2000): pref_security.diff
Fix (2nd November 2000): total_weight.diff
Fix (13th December 2000): keymaps.diff
Fix (19th January 2001): jukebox.diff
Description: The game does not check the case in wich your max experience earns you a new max. level while your current experience does not allow you to reach that level.
Fix (21st January 2001): max_level.diff
Fix (22nd January 2001): hitpoint_warn.diff
Fix (23rd January 2001): quit_curses.diff
Description: The file-reader used in the help-file display and the knowledge menu can be used to read files that should only be readable by group games (when running setgid games).
Fix (27th January 2001): show_file.diff
Fix (1st February 2001): cygwin.diff
Fix (2nd February 2001): spell_info.diff
Fix (7th February 2001): alloc_monster.diff
Fix (7th February 2001): object_spoiler.diff
© 2000 by Robert Rühlmann, rr9@thangorodrim.net |