user32: Fix DLL injection problem using LOAD_WITH_ALTERED_SEARCH_PATH.
This commit is contained in:
parent
4b8adbef86
commit
650a0f3fdd
|
@ -322,7 +322,7 @@ void *get_hook_proc( void *proc, const WCHAR *module )
|
||||||
{
|
{
|
||||||
TRACE( "loading %s\n", debugstr_w(module) );
|
TRACE( "loading %s\n", debugstr_w(module) );
|
||||||
/* FIXME: the library will never be freed */
|
/* FIXME: the library will never be freed */
|
||||||
if (!(mod = LoadLibraryW(module))) return NULL;
|
if (!(mod = LoadLibraryExW(module, NULL, LOAD_WITH_ALTERED_SEARCH_PATH))) return NULL;
|
||||||
}
|
}
|
||||||
return (char *)mod + (ULONG_PTR)proc;
|
return (char *)mod + (ULONG_PTR)proc;
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue