If you have lots of RAM available, but need to save some space on /boot with Arch Linux   when using mkinitcpio (default initramfs setup): Set MODULES_DECOMPRESS in your mkinitcpio.conf to yes.

The default zstd compression will ensure the initramfs image on /boot to be smaller than if this option were not enabled, but RAM usage may be higher when booting.

#ArchLinux  #initramfs #mkinitcpio

How can i stop update-initramfs from messing with crypttab's keyfile path? #boot #luks #initramfs #cryptsetup

https://askubuntu.com/q/1554163/612

How can i stop update-initramfs from messing with crypttab's keyfile path?

I'm having trouble to get a fresh manual installation of ubuntu 24.04. Upon inspecting it from initramfs, the crypttab file has been edited during the initrd generation process, namely the keyfile ...

Ask Ubuntu

Ubuntu stuck in busy box initramfs after a reboot #boot #dualboot #initramfs #busybox

https://askubuntu.com/q/1553851/612

Ubuntu stuck in busy box initramfs after a reboot

I recently installed Ubuntu (first time user) on a dual boot with two separate drives (one windows, one ubuntu). Everything was working like a charm until a did a reboot (I've power off before with...

Ask Ubuntu

Wie startet dein Linux-System und wie konfigurierst du den Boot-Prozess professionell? Genau hier kommt das Boot-Management ins Spiel – ein absolut kritischer Bereich der Linux-Administration, den du als angehender Administrator unbedingt verstehen musst.

Ohne dieses Grundverständnis stehst du bei Boot-Problemen hilflos da.

https://admindocs.de/linux-administration/linux-administration-10-boot-management-systemstart.shtml

#BootManagement #grub2 #linux #sysadmin #initramfs #linuxtutorial

Linux Administration #10: Boot-Management & Systemstart - Admin:Docs

Lerne Linux Boot-Management: Boot-Prozess, GRUB2-Konfiguration, Kernel-Parameter und initramfs. Praktische Anleitung für Einsteiger und Administratoren.

Admin:Docs

(more Linux news in original post)

Initramfs vulnerability lets attackers with physical access compromise encrypted systems by entering incorrect password several times and accessing the debug shell on Ubuntu 25.04 and Fedora 42 systems:
https://www.omgubuntu.co.uk/2025/07/ubuntu-security-initramfs-bypass-encryption

Linux kernel 6.15.6 and 6.12.37 LTS deliver TSA (Transient Scheduler Attacks) mitigations:
https://www.phoronix.com/news/Linux-6.15.6-Linux-6.12.37-LTS

Wayback is now hosted on FreeDesktop.org:
https://www.phoronix.com/news/Wayback-FreeDesktop.org

System76 Adder WS laptop available with Intel Core Ultra i9 and NVIDIA 50 series:
https://9to5linux.com/system76s-adder-ws-linux-laptop-gets-intel-core-ultra-i9-and-nvidia-50-series

(FOSS news in comments)

#WeeklyNews #News #Linux #LinuxNews #Initramfs #LinuxKernel #Wayback #System76 #LinuxDesktop #DesktopLinux #LinuxLaptop #XWayland #Security #Vulnerability #FosseryTech

New Linux Security Flaw Uses Initramfs to Inject Malware

A newly found security flaw in Ubuntu could allow attackers with physical access to bypass full disk encryption. Learn how the attack works.

OMG! Ubuntu
Initramfs: Čo to je a ako to využiť v náš prospech

Blog o roznych veciach

Fedora 43 to Use Zstd Compression for Faster Boot and Smaller Initrd #fedora43 #zstd #initrd #initramfs #fastboot #linux #dracut
https://ostechnix.com/fedora-43-initrd-zstd-compression/

Ubuntu Security Flaw Lets Attackers Bypass Full Disk Encryption
#OMGUbuntu article: https://www.omgubuntu.co.uk/2025/07/ubuntu-security-initramfs-bypass-encryption

“Not all #Linux distributions are affected, such as #OpenSUSE_Tumbleweed.”

#Attackers with physical access to a Linux system can access a debug shell simply by entering the wrong #decryption #password several times in a row. On Ubuntu, they hit esc at the password prompt, punch in a few key combos and debug shell appears.
They can mount a USB drive with tools that let them modify the #initramfs (Initial RAM Filesystem – a temporary system run during boot to prep the main OS) to inject #maliciouscode, and then repack it – without tripping any #security flags.
Then, the next time the owner boots up their #laptop and enters their correct password, the code runs with elevated privileges to do whatever the #attacker wants.”

“Impactful though this exploit could be in the wild, there is no reason for most #Ubuntu users to be concerned about it.
This #vulnerability is what the security industry refer to as an '#evilmaidattack': it requires physical access to a #device to pull off.”

“Finally, protecting against this #vulnerability is easy. Users can simply tweak their system #kernel so that the #computer #reboots on failed password attempts, instead of providing a #debug shell.”

New Linux Security Flaw Uses Initramfs to Inject Malware

A newly found security flaw in Ubuntu could allow attackers with physical access to bypass full disk encryption. Learn how the attack works.

OMG! Ubuntu
This was not the first time and it got me upset.
Now I have a solution.
#debian #initramfs
#immich server is back online on the new machine. Double the drive size as a bonus. #clonezilla took care of cloning the old drive to the NVMe on the NUC. Had trouble booting at first until I switched to a fallback initramfs. From what I understand I might need to rebuild the existing #initramfs images. The joy and terror of #selfhosting 😬