MERGE
CONFLICT
DIGEST
|
September 29, 2025
|
|
Infrastructure & Services 🏗️
|
|
Linus Torvalds added a tiny patch to Linux 6.17’s top‑level Makefile, replacing the EXTRAVERSION field from “‑rc7” with a new variable `NAME = Baby Opossum Posse`. The change is purely cosmetic and does not affect existing logic.
|
|
|
Cloudflare is launching its private beta of an email service that allows developers to send transactional emails directly from Cloudflare Workers, aiming to simplify and integrate email management into development workflows with features like deliverability and unified experience.
|
|
|
Security & Vulnerabilities 🛡️
|
|
FullHunt has launched the 0day.today Archive, a free repository of 39,408 exploits from 1996‑2025, consolidating 0day.today, 1337day, and milw0rm. Hosted at 0day‑archive.fullhunt.io and mirrored on GitHub, it supports researchers, pentesters, and offers enterprise services.
|
|
|
Linux 6.18 updates its audit subsystem to log when multiple LSMs are active and to default‑log fanotify events, adding auxiliary records that capture distinct LSM labels for tasks and objects, enhancing security visibility ahead of the merge.
|
|
|
JWTs embed auth data in header, payload, and signature, eliminating server sessions. The guide covers structure, validation, misconfigurations, and attacks such as the “none” algorithm, brute‑forcing, key injection, shown with Burp, jwt.io, Web Academy labs, emphasizing validation and key management.
|
|
|
A previously unknown technique allows attackers to compromise Chromium-based browsers by forcing arbitrary extension loading on Windows domains, bypassing security policies and gaining access to sensitive data such as tokens and credentials through a simple disk write primitive.
|
|
|
Ubuntu 25.10's switch to Rust Coreutils has caused major breakage for some executables, particularly those using Makeself archives, resulting in reported checksum errors on the files, prompting concerns about potential launch-day issues if not resolved soon enough.
|
|
|
A new approach to security suggests creating nuanced solutions, such as context walls and AI lie detectors, to spot suspicious behavior. This method aims to make security a natural part of development workflows, increasing trust in systems without sacrificing performance.
|
|
|
GitHub’s new mandatory two‑factor authentication, granular token scopes, and trusted publishing for maintainers aim to block Shai‑Hulud worm vectors, aligning with DevSecOps trends; companies now use SCA tools and polyfills to strengthen OSS supply chains.
|
|
|
Cloudflare's Managed Ruleset has been updated with 11 new detections to address various threat types, including SQL injection, command and code injection, and cross-site scripting. The updates enhance security posture by protecting against a broad spectrum of threats and vulnerabilities.
|
|
|
Data & Analytics 📊
|
|
Apache Kafka's architecture is broken down into manageable parts, starting with log data structures and moving to distributed consensus, replication, and consumer groups. Its rich integration capabilities make it a popular choice for data engineers worldwide through connectors and plugins.
|
|
|
Organizations face complex tech environments requiring unified observability practices to navigate effectively, according to Grafana Labs Co-founder Anthony Woods on the "Tech Keys" podcast, hosted by Vaibhav Khurana, emphasizing the need for cohesive monitoring strategies.
|
|
|
DNS resolution failures can lead to timeouts, connection errors, and decreased performance, causing frustrating issues for users. Without clear indication of the root cause, it's challenging for users to identify and address the problem effectively, resulting in prolonged downtime.
|
|
|
DevOps & Operations 🚀
|
|
Valve’s Linux graphics team quietly revives AMD GCN 1.0/1.1 GPUs, patching them into the AMDGPU stack. Contractor Timur Kristóf improves VRAM, display, and stability, addressing 4 K artifacts, ASPM hangs, and PLL alignment, slated for Linux 6.18.
|
|
|
A small tech company with 20-30 employees transitioned from Docker Swarm to Kubernetes for infrastructure management, overcoming limitations like single points of failure and security issues. They successfully migrated to a stable and secure infrastructure, leveraging Kubernetes' consistency across environments.
|
|
|
At SwampUP 2025, Alan interviewed Demetrios Brinkmann, founder of the MLOps Community, about the gap between AI research and production deployments; the community, with over 100,000 developers, promotes collaboration, best practices and tools to translate breakthroughs into reliable, business‑ready solutions.
|
|
|
HashiCorp unveiled a major platform overhaul at HashiConf 2025, adding integrations with Harness, Kong, Sentry, Wiz, Veracode, and ASPM. A new AI‑powered preview feature automates infrastructure‑as‑code provisioning, while IBM’s unit will spotlight Project Infragraph next week, exploring deeper analytics and automation.
|
|
|
Browser & Platform 🌐
|
|
As a DevOps lead, securing your web server is crucial, starting with obtaining a trusted certificate for TLS encryption and configuring Nginx to enable HTTP/2, improve performance, and maintain compatibility through seven practical steps for enhanced security.
|
|
|
Hardware & Infrastructure 🔧
|
|
The article compares PostgreSQL 12–18 releases, showing transaction counts rising from 1.66 M to 1.83 M, latency falling from 97.8 ms to 32.3 ms, and TPS doubling from 3.6 k to 7.0 k, highlighting performance improvements.
|
|
|
Security & Privacy 🔒
|
|
Developers can protect their projects from supply chain vulnerabilities by implementing strong two-factor authentication, trusted publishing, and reproducible installs to prevent stolen credentials and malicious package releases, reducing reliance on identity-based access for security.
|
|
|
AI in Society & Economy 🌍
|
|
LLMOps extends MLOps by operationalizing large language models under latency, cost, security, and compliance constraints, offering an end‑to‑end framework across OpenAI, Azure, AWS, Google, and OSS, featuring prompt versioning, cost‑aware orchestration, guardrails, observability, and audit trails for regulated sectors.
|
|
|
|
Published by Merge Conflict Digest
|