Solved

Upgrade from libc5 to libc6 in Debian 1.3.1

Posted on 1998-10-25
1
307 Views
Last Modified: 2013-12-15
I want to know which file exactly i must down load and in wich order must be installed.
I suposse when i install libc6 the programs linked with libc5 should work, but i could use compiled with libc6 too, isn't it?
0
Comment
Question by:juanlz
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 2

Accepted Solution

by:
Resonance earned 100 total points
ID: 1631241
There are two ways to do this.  The easy way is to download the apt package (and you may need a newer version of dpkg for it) and let it do this for you.

ftp://ftp.debian.org/pub/debian/hamm/upgrade-i386/apt_0.1.4.bo_i386.deb

ftp://ftp.debian.org/pub/debian/hamm/upgrade-i386/dpkg_1.4.0.8.deb

Install those packages, edit /etc/apt/sources.list to point to ftp.debian.org for stable (or unstable, if you're feeling adventurous), and tell it:

apt-get update (be prepared to wait a while if you have a slow connection)

apt-get -s install libc6 locales timezones (the -s means simulate)

*look carefully at the result*  I haven't seen apt make a mistake yet, but it can potentially do something stupid like saying that it needs to remove libc or something like that.  It will however tell you.

If everything looks okay, run:

apt-get install libc6 locales timezones (and be prepared to wait a good long time on a slow connection :)

Apt will then automagically determine which files you need, and in which order.


IF YOU ABSOLUTELY FEEL that you have to do this the hard way, you need to go read the file at

 http://www.gate.net/~storm/FAQ/libc5-libc6-Mini-HOWTO.txt

Since there are many issues involved with upgrading by hand that would be too long to write here.  

0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Setting up Secure Ubuntu server on VMware 1.      Insert the Ubuntu Server distribution CD or attach the ISO of the CD which is in the “Datastore”. Note that it is important to install the x64 edition on servers, not the X86 editions. 2.      Power on th…
SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial
Suggested Courses

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question