True, but at least it's a workaround for those who use DOSLFN. (I
should have described it as a workaround, not a 'fix.' I'll update the
news item.)



On Mon, Aug 18, 2025 at 5:16 PM Michael Brutman <mbbrut...@brutman.com> wrote:
>
> DOSLFN might be covered using that brute-force approach, but the bug
> still exists ...  INT 25 and 26 need some sort of integration with
> the existing buffer cache, otherwise every other user of INT 25 and
> INT 26 are still exposed.
>
>
> On Mon, Aug 18, 2025 at 3:08 PM Jim Hall via Freedos-devel 
> <freedos-devel@lists.sourceforge.net> wrote:
>>
>> I don't know if everyone saw this, so I'll repeat the news item here.
>> I saw that Jason Hood posted an update to DOSLFN that seems to fix
>> this issue. Here's the news item I posted on the website earlier
>> today:
[..]


_______________________________________________
Freedos-devel mailing list
Freedos-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/freedos-devel

Reply via email to