![]() ![]() Call of Duty (cod2vawo) - "Attempted to overrun string in call to va()"Īnd patch for the old legacy 1.0 and 1.0a Linux versions Call of Duty 2 (1.3) work-around for the va() bug 0.1.Call of Duty 1 / UO / 2 fix for the callvote buffer-overflow 0.1 (Windows and Linux).(cod4vawo) - "Attempted to overrun string in call to va()" (works with both 1.6, 1.7 and newer versions like Call of Duty 5 / World at War) Call of Duty 4 (1.7) and Call of Duty 5 (1.7) work-around for the va() bug 0.1a (Windows).Call of Duty 4 1.7 fix for the callvote buffer-overflow 0.1 (Windows).Gamall Ida has written an interesting solution for all the known bugs which affect Jedi Academy, included the fake players attack: You need to download also the codmsgfix patch for Call of Duty you see below How to fix the in-game message buffer-overflow of Jedi AcademyĮasy to use step by step required because the game overwrites the DLL files in the base folder, the patch is THE SAME of Call of Duty (the bug is the same too).Enemy Territory 2.55/2.60b and ET Pro 3.1.0/3.2.6 Cmd_WeaponStat_f fix 0.1 (Windows and Linux)Īlthough this patch works also with ET Pro I HIGHLY suggest to use the well known a of ReyalP with this mod because it's updated for any problem specific of this game.these patches should work with Counter-Strike 1.6 too, anyway remember ever to test your server after having patched it.Half-Life x.1.1.1e (Windows and Linux) hlboom fix 0.1.The fix for the so called "Born to be pig" attack has been implemented in an experimental way only on Windows (so there are no differences on Linux between this and the old 0.1 version), anyway the previous version is still available here Half-Life x.1.1.1e (Windows and Linux) hlfreeze/hl-headnut/csdos/btbp fix 0.1.1.Ventrilo "VoiceIndexServer termination (out of memory) in Unreal engine 3 fix 0.2 / official patch from EpicGames. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |