Skip to content

Ransomware-Like Behavior with lockfile.DB During Conda Transaction Execution #761

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
1 task done
novohool opened this issue Mar 31, 2025 · 0 comments
Open
1 task done
Assignees
Labels
bug Something isn't working windows

Comments

@novohool
Copy link

novohool commented Mar 31, 2025

Solution to issue cannot be found in the documentation.

  • I checked the documentation.

Issue

When using Conda to remove packages, the "Executing transaction" report
Image

Installed packages

conda env list

# conda environments:
#
py39env                C:\Users\****\.conda\envs\py39env
base                   C:\Users\****3\AppData\Local\Temp\_MEI492002
                     * D:\ProgramData\miniforge

Environment info

conda env list

# conda environments:
#
py39env                C:\Users\****\.conda\envs\py39env
base                   C:\Users\****\AppData\Local\Temp\_MEI492002
                     * D:\ProgramData\miniforge


(base) D:\workspace>conda info

     active environment : D:\ProgramData\miniforge
    active env location : D:\ProgramData\miniforge
            shell level : 2
       user config file : C:\Users\****\.condarc
 populated config files : C:\Users\****\AppData\Local\Temp\_MEI521802\.condarc
                          D:\ProgramData\miniforge\.condarc
          conda version : 24.11.0
    conda-build version : not installed
         python version : 3.12.8.final.0
                 solver : libmamba (default)
       virtual packages : __archspec=1=x86_64_v4
                          __conda=24.11.0=0
                          __win=0=0
       base environment : C:\Users\****\AppData\Local\Temp\_MEI521802  (read only)
      conda av data dir : C:\Users\****\AppData\Local\Temp\_MEI521802\etc\conda
  conda av metadata url : None
           channel URLs : https://conda.anaconda.org/conda-forge/win-64
                          https://conda.anaconda.org/conda-forge/noarch
          package cache : C:\Users\****\AppData\Local\Temp\_MEI521802\pkgs
                          C:\Users\****\.conda\pkgs
                          C:\Users\****\AppData\Local\conda\conda\pkgs
       envs directories : C:\Users\****\.conda\envs
                          C:\Users\****\AppData\Local\Temp\_MEI521802\envs
                          C:\Users\****\AppData\Local\conda\conda\envs
               platform : win-64
             user-agent : conda/24.11.0 requests/2.32.3 CPython/3.12.8 Windows/10 Windows/10.0.19045 solver/libmamba conda-libmamba-solver/24.9.0 libmambapy/1.5.11
          administrator : False
             netrc file : None
           offline mode : False
@novohool novohool added the bug Something isn't working label Mar 31, 2025
@novohool novohool changed the title conda Executing transaction, ransom lockfile.DB conda Executing transaction Mar 31, 2025
@novohool novohool changed the title conda Executing transaction Ransomware-Like Behavior with lockfile.DB During Conda Transaction Execution Mar 31, 2025
@hmaarrfk hmaarrfk self-assigned this Mar 31, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working windows
Development

No branches or pull requests

2 participants