• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

The Geek Diary

CONCEPTS | BASICS | HOWTO

  • OS
    • Linux
    • CentOS/RHEL
    • Solaris
    • Oracle Linux
    • Linux Services
    • VCS
  • Database
    • oracle
    • oracle 12c
    • ASM
    • mysql
    • MariaDB
    • Data Guard
  • DevOps
    • Docker
    • Shell Scripting
  • Interview Questions
  • Big Data
    • Hadoop
    • Cloudera
    • Hortonworks HDP

How to Reinstall Corrupted Library with yum

By admin

This post will guide the user on how to reinstall a corrupted library via yum.

In general, the command below will find which package the corrupted library belongs to:

# yum provides \*/[so_file]

In this example, we used this error message “/bin/login: error while loading shared libraries: /lib64/libcrypt.so.1: file too short” to identify the corrupted library and the find the package it originally came from:

# yum provides \*/libcrypt.so.1
...
glibc-2.17-260.0.17.el7_6.6.x86_64 : The GNU libc libraries
Repo : ol7_x86_64_latest
Matched from:
Filename : /lib64/libcrypt.so.1

In this case, the package the library originally came from is “glibc-2.17-260.0.17.el7_6.6.x86_64“. This is the package that needs to be reinstalled. The general command is:

# yum reinstall [package name]

From our example, the command is:

# yum reinstall glibc-2.17-260.0.17.el7_6.6.x86_64

Filed Under: CentOS/RHEL 6, CentOS/RHEL 7, Linux

Some more articles you might also be interested in …

  1. CentOS / RHEL 6,7 : How to increase system log message verbosity (rsyslogd)
  2. Understanding iscsiadm Utility in CentOS / RHEL
  3. Auditd Messages Are Filling Up /var/log/messages
  4. How to Customize Linux Password Expiration and Complexity Requirements
  5. Linux OS Service ‘avahi-daemon’
  6. How to create partitions and file systems on DM-Multipath devices
  7. CentOS / RHEL : How to create a Thinly Provisioned Logical Volume
  8. How to Install and configure telnet in RHEL / CentOS 5,6
  9. Linux OS Service ‘ntpd’
  10. How to Disable or set SELinux to Permissive mode

You May Also Like

Primary Sidebar

Recent Posts

  • Oracle Database – Configuring Secure Application Roles
  • Extend rule sets by using factors in Oracle Database Vault
  • What are Command Rules in oracle Database
  • Using Rule Sets in Oracle Database Vault
  • Archives
  • Contact Us
  • Copyright

© 2021 · The Geek Diary