Seems like a new linux virus preventing me from running compiled snap.
Not the right place to report but who knows? When I recompile the snap
package and changed "help" output to "refresh !!! and remove snaps" and
unpack the content of resulting file into 123/. I reinstall the system
package and result md5 sum look like this:

axet@axet-laptop:~/local$ md5sum 123/usr/bin/snap /usr/bin/snap
f6639f5060dcd23506082f6ff0699f72  123/usr/bin/snap
f6639f5060dcd23506082f6ff0699f72  /usr/bin/snap
axet@axet-laptop:~/local$ 

When I run the package from ./123/usr/bin/snap I got my "!!! and remove
snaps" but when I ran the same file (same md5) from /usr/bin/snap I got
the old output.

axet@axet-laptop:~/local$ ./123/usr/bin/snap
The snap command lets you install, configure, refresh !!! and remove snaps.
Snaps are packages that work across many different Linux distributions,
enabling secure delivery and operation of the latest apps and utilities.

...

axet@axet-laptop:~/local$ /usr/bin/snap
The snap command lets you install, configure, refresh and remove snaps.
Snaps are packages that work across many different Linux distributions,
enabling secure delivery and operation of the latest apps and utilities.

...

Even when I copy my /usr/bin/snap into 111111 file and run it from
another location I still getting my new "!!! and remove" string. Seems
like somthing (bug or virus) load old snap package when I run it from
/usr/bin/snap location and when I read the same file I get my actual
file system data. Not sure what kind of virus, trojan or system nvme,
encryption or kernel bug I have... Maybe anyone knows?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1776873

Title:
  Whitelisted allowedURLschemes breaks some desktop apps

To manage notifications about this bug go to:
https://bugs.launchpad.net/snapd/+bug/1776873/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to