Debian Linux 10.3 released and here is how to upgrade it

The Debian GNU/Linux project has released an updated version of its stable Linux distribution Debian 10 (“buster”). You must upgrade to get corrections for security problem as this version made a few adjustments for the severe issue found in Debian version 10.2. Debian is a Unix-like (Linux distro) operating system and a distribution of Free Software. It is mainly maintained and updated through the work of many users who volunteer their time and effort. The Debian Project was first announced in 1993 by Ian Murdock.


More about Debian Linux 10.3 released

From the release note:

The Debian project pleased to announce the second update of its stable distribution Debian 10 (codename “buster”). This point release mainly adds corrections for security issues, along with a few adjustments for serious problems. Security advisories have already been published separately and are referenced where available.

Please note that the point release does not constitute a new version of Debian 10 but only updates some of the packages included. There is no need to throw away old “buster” media. After installation, packages can be upgraded to the current versions using an up-to-date Debian mirror.

Those who frequently install updates from won’t have to update many packages, and most such updates are included in the point release.

New installation images will be available soon at the regular locations.

How to upgrade Debian 10 from version 10.2 to 10.3

The procedure is as follows. First, note down the current version:
$ lsb_release -a
$ cat /etc/debian_version
$ uname -mrs

Sample outputs:

No LSB modules are available.
Distributor ID:	Debian
Description:	Debian GNU/Linux 10 (buster)
Release:	10
Codename:	buster




Linux 4.19.0-6-amd64 x86_64

Upgrade the Debian Linux system to 10.2

Type the following apt-get command/apt command to upgrade your system:
$ sudo apt-get update
$ sudo apt update

Get:1 buster InRelease [122 kB]
Get:2 buster/updates InRelease [65.4 kB]
Get:3 buster-updates InRelease [49.3 kB]
Get:4 buster/main Sources [7,832 kB]
Get:5 buster/main amd64 Packages [7,907 kB]
Get:6 buster/main Translation-en [5,970 kB]
Get:7 buster/updates/main Sources [102 kB]
Get:8 buster/updates/main amd64 Packages [176 kB]
Get:9 buster/updates/main Translation-en [92.8 kB]
Fetched 22.3 MB in 6s (3,517 kB/s)                                             
Reading package lists... Done
Building dependency tree       
Reading state information... Done
28 packages can be upgraded. Run 'apt list --upgradable' to see them.
N: Repository ' buster InRelease' changed its 'Version' value from '10.2' to '10.3'

Please note the version number changed in last line. Next, apply updates, run:
$ sudo apt-get dist-upgrade
$ sudo apt dist-upgrade

Updating Debian 10.2 system with the help of apt-get/apt command

Finally, reboot the Linux system, type:
$ sudo shutdown -r now


Verify that upgrade went smoothly with help of cat command/grep command/egrep command:
$ uname -mrs
$ lsb_release -a
$ dmesg | egrep -i 'err|warn|critical'
$ sudo tail -f /var/log/nginx/access_log


The installer has been updated to include the fixes incorporated into stable by the point release. You can download updated ISO for full installation too. This stable update added important package corrections and security enhancements to the system. Happy upgrades!

🐧 Please support my work on Patreon or with a donation.
🐧 Get the latest tutorials on Linux, Open Source & DevOps via:
CategoryList of Unix and Linux commands
File Managementcat
FirewallAlpine Awall CentOS 8 OpenSUSE RHEL 8 Ubuntu 16.04 Ubuntu 18.04 Ubuntu 20.04
Network Utilitiesdig host ip nmap
OpenVPNCentOS 7 CentOS 8 Debian 10 Debian 8/9 Ubuntu 18.04 Ubuntu 20.04
Package Managerapk apt
Processes Managementbg chroot cron disown fg jobs killall kill pidof pstree pwdx time
Searchinggrep whereis which
User Informationgroups id lastcomm last lid/libuser-lid logname members users whoami who w
WireGuard VPNAlpine CentOS 8 Debian 10 Firewall Ubuntu 20.04

Comments on this entry are closed.

Use HTML <pre>...</pre> for code samples. Problem posting comment? Email me @