Installing Debian 9.13
To install Debian 9.13 (stretch), download any of the following images (all i386 and amd64 CD/DVD images can be used on USB sticks too):
If any of the hardware in your system requires non-free firmware to be loaded with the device driver, you can use one of the tarballs of common firmware packages or download an unofficial image including these non-free firmwares. Instructions how to use the tarballs and general information about loading firmware during an installation can be found in the Installation Guide (see Documentation below).
- For downloading full CD and DVD images the use of BitTorrent or jigdo is recommended.
- For the less common architectures only a limited number of images from the CD and DVD sets is available as ISO file or via BitTorrent. The full sets are only available via jigdo.
- The multi-arch CD images support i386/amd64; the installation is similar to installing from a single architecture netinst image.
- The multi-arch DVD image supports i386/amd64; the installation is similar to installing from a single architecture full CD image; the DVD also includes the source for all included packages.
- For the installation images, verification files (SHA256SUMS, SHA512SUMS and other) are available from the same directory as the images.
If you read only one document before installing, read our Installation Howto, a quick walkthrough of the installation process. Other useful documentation includes:
- Stretch Installation Guide
detailed installation instructions
- Debian-Installer FAQ
and Debian-CD FAQ
common questions and answers
- Debian-Installer Wiki
community maintained documentation
This is a list of known problems in the installer shipped with Debian 9.13. If you have experienced a problem installing Debian and do not see your problem listed here, please send us an installation report describing the problem or check the wiki for other known problems.
Errata for release 9.0
- pkgsel did not install updates with ABI changes (by default)
- Bug #908711:
during installation with network sources enabled, the
installed security updates don't include updates that depend on a new
binary package, due to a kernel or library ABI change.
Status: This has been fixed in 9.6
- APT was vulnerable to a man-in-the-middle attack
- A bug in the APT HTTP transport method
could be exploited by an attacker located as a man-in-the-middle between APT
and a mirror to cause the installation of additional, malicious, packages.
This can be mitigated by disabling use of the network during initial installation and then upgrading following the instructions in DSA-4371.
Status: This has been fixed in 9.7