develooper Front page | perl.par | Postings from December 2018

Re: [rt.cpan.org #127918] PAR::Packer produces executable with virus

From:
Jeff Hemmerling via RT
Date:
December 19, 2018 23:52
Subject:
Re: [rt.cpan.org #127918] PAR::Packer produces executable with virus
Message ID:
rt-4.0.18-29324-1545263522-1397.127918-15-0@rt.cpan.org
Wed Dec 19 18:52:01 2018: Request 127918 was acted upon.
Transaction: Correspondence added by jeff@hemmerling.net
       Queue: PAR-Packer
     Subject: Re: [rt.cpan.org #127918] PAR::Packer produces executable with virus
   Broken in: (no value)
    Severity: (no value)
       Owner: Nobody
  Requestors: jeff@hemmerling.net
      Status: open
 Ticket <URL: https://rt.cpan.org/Ticket/Display.html?id=127918 >


On 12/05/2018 02:13, Martin McGrath via RT wrote:
> <URL: https://rt.cpan.org/Ticket/Display.html?id=127918 >
> 
> In the past I'd experienced problems installing pp on windows in a corporate environment, caused by over sensitive AV/Security software. Once resolved the exes generated didn't exhibit the problem you're experiencing, but it's not unheard of:
> 
> https://perlmonks.org/?node_id=1222404
> 
> I trust you've ensured that the machine itself has no underlying infection? Also, which version of perl do you have installed (AS/Strawberry, x86/x86_64?)

Thanks for your reply.  I know it's Packer code causing the problem
because the virus detector goes off as soon as "boot.exe" is
produced during installation.

I just rewrote the code in C++ to avoid all this.

Using 32-bit Strawberry perl:

   % /apps/devtools/Strawberry/perl/bin/perl.exe --version
   This is perl 5, version 28, subversion 0 (v5.28.0) built for MSWin32-x86-multi-thread-64int
   Copyright 1987-2018, Larry Wall

-- 
-- Jeff Hemmerling



nntp.perl.org: Perl Programming lists via nntp and http.
Comments to Ask Bjørn Hansen at ask@perl.org | Group listing | About