Solved

Upgrade from libc5 to libc6 in Debian 1.3.1

Posted on 1998-10-25
1
298 Views
Last Modified: 2013-12-15
I want to know which file exactly i must down load and in wich order must be installed.
I suposse when i install libc6 the programs linked with libc5 should work, but i could use compiled with libc6 too, isn't it?
0
Comment
Question by:juanlz
1 Comment
 
LVL 2

Accepted Solution

by:
Resonance earned 100 total points
ID: 1631241
There are two ways to do this.  The easy way is to download the apt package (and you may need a newer version of dpkg for it) and let it do this for you.

ftp://ftp.debian.org/pub/debian/hamm/upgrade-i386/apt_0.1.4.bo_i386.deb

ftp://ftp.debian.org/pub/debian/hamm/upgrade-i386/dpkg_1.4.0.8.deb

Install those packages, edit /etc/apt/sources.list to point to ftp.debian.org for stable (or unstable, if you're feeling adventurous), and tell it:

apt-get update (be prepared to wait a while if you have a slow connection)

apt-get -s install libc6 locales timezones (the -s means simulate)

*look carefully at the result*  I haven't seen apt make a mistake yet, but it can potentially do something stupid like saying that it needs to remove libc or something like that.  It will however tell you.

If everything looks okay, run:

apt-get install libc6 locales timezones (and be prepared to wait a good long time on a slow connection :)

Apt will then automagically determine which files you need, and in which order.


IF YOU ABSOLUTELY FEEL that you have to do this the hard way, you need to go read the file at

 http://www.gate.net/~storm/FAQ/libc5-libc6-Mini-HOWTO.txt

Since there are many issues involved with upgrading by hand that would be too long to write here.  

0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

943 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

1 Experts available now in Live!

Get 1:1 Help Now