user32: Fix DLL injection problem using LOAD_WITH_ALTERED_SEARCH_PATH.
This commit is contained in:
parent
4b8adbef86
commit
650a0f3fdd
|
@ -322,7 +322,7 @@ void *get_hook_proc( void *proc, const WCHAR *module )
|
|||
{
|
||||
TRACE( "loading %s\n", debugstr_w(module) );
|
||||
/* FIXME: the library will never be freed */
|
||||
if (!(mod = LoadLibraryW(module))) return NULL;
|
||||
if (!(mod = LoadLibraryExW(module, NULL, LOAD_WITH_ALTERED_SEARCH_PATH))) return NULL;
|
||||
}
|
||||
return (char *)mod + (ULONG_PTR)proc;
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue