Commit 650a0f3f authored by Hongbo Ni's avatar Hongbo Ni Committed by Alexandre Julliard

user32: Fix DLL injection problem using LOAD_WITH_ALTERED_SEARCH_PATH.

parent 4b8adbef
......@@ -322,7 +322,7 @@ void *get_hook_proc( void *proc, const WCHAR *module )
{
TRACE( "loading %s\n", debugstr_w(module) );
/* FIXME: the library will never be freed */
if (!(mod = LoadLibraryW(module))) return NULL;
if (!(mod = LoadLibraryExW(module, NULL, LOAD_WITH_ALTERED_SEARCH_PATH))) return NULL;
}
return (char *)mod + (ULONG_PTR)proc;
}
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment