This Week in TUXEDO OS #10-2025 - TUXEDO Computers

  ATTENTION: To use our store you have to activate JavaScript and deactivate script blockers!  
Thank you for your understanding!

This Week in TUXEDO OS #10-2025

Hello TUXEDO Fans and Open-Source Enthusiasts!

Spring is here, and our developer penguins are working up quite a sweat. But despite slippery flippers and steaming terminals, they have once again done a great job: Firefox 136 brings vertical tabs and better hardware support. We also take a look at the KDE Partition Manager, which helps with neatly organizing hard drives, and show you how to get rid of a particularly sticky „Edge Barrier.“

Enjoy reading,
The TUXEDO OS Team

With the TWIX series, we aim to keep you updated on the latest developments in TUXEDO OS and introduce exciting applications and practical tips for the KDE desktop and TUXEDO OS. But this section is not meant to be a one-way street: Your feedback, ideas, and suggestions for improvement are more than welcome! We have set up a thread on Reddit where you can reach us directly.

TUXEDO OS Updates

In the TUXEDO OS Repositories

Firefox 136
  • Vertical Tabs – Tabs can now be arranged in a sidebar.
  • HTTPS-First – Firefox prioritizes HTTPS and falls back to HTTP only when necessary.
  • Hardware-Accelerated Video Playback – Improved support for AMD GPUs.
  • ARM64 Support – Firefox is now available for Linux on ARM64 (AArch64).
  • Enhanced Sidebar – Quick access to bookmarks, history, and more.

Read more details about Firefox 136 in this article.

KDE App of the Week: KDE Partition Manager

If you’ve been using Linux for a while, you’re probably familiar with the partitioning tool GParted, also known as the GNOME Partition Editor. Less known, however, is that KDE also provides a powerful tool for managing storage devices: KDE Partition Manager.

KDE Partition Manager is a utility for managing disks, partitions, and file systems on your computer. It allows you to create, copy, move, delete, back up, restore, and resize partitions – all without data loss. It supports numerous file systems, including EXT2/3/4, Btrfs, XFS, NTFS, and FAT16/32.

The application provides a graphical interface for the command-line tool GNU Parted from the Free Software Foundation. The official documentation explains in detail how to use the software. When working with programs that modify partitioning and file systems, always remember to create a current backup of your important data.

For an overview of the latest developments and updated KDE apps from the past week, check out the KDE developer community’s column This Week in KDE Apps.

TUXEDO OS Tips & Tricks: Delayed Display Switching

In the world of open-source software, changes are often welcome but can also bring unexpected challenges. One example is the new default option „Edge Barrier,“ introduced in a recent KDE update here.

This feature was designed to help users access a vertical auto-hide panel more easily in multi-monitor setups. However, it can also significantly hinder multi-screen usage by making it harder to move the mouse between displays. In this guide, we’ll show you how to adjust this setting to restore the smooth display transition you’re accustomed to.

Edge Barrier Captures the Mouse Pointer

After updating to on of the latest versions of KDE, you might notice that the „Edge Barrier“ feature is enabled. This causes the mouse to „stick“ at screen edges when moving between monitors. This can be frustrating, especially if you frequently switch between screens. Note that this feature is only active under Wayland. Users working with X11 are not affected and won’t notice any changes.

Disabling the Edge Barrier

  1. Open System Settings: Click on the KDE start menu and select System Settings.
  2. Navigate to Mouse & Touchpad Settings: In System Settings, find the Input & Output section. Click on it and select Mouse & Touchpad.
  3. Adjust Screen Edges: Locate the Screen Edges subsection. Here, you will find the Edge barrier option. Change the value from 100 px to None. This disables the Edge Barrier and allows seamless mouse movement between screens.
  4. Save Changes: Click Apply to save the new settings and close System Settings.

Security Updates for Ubuntu

The security updates listed here are directly integrated into TUXEDO OS:

  • USN-7323–2: Linux kernel vulnerabilities: Multiple security issues have been fixed in the Linux kernel.
    Identifier: CVE-2024–56672, CVE-2024–56658, CVE-2025–0927
    Affects: Ubuntu 24.10

  • USN-7334–1: Firefox vulnerabilities: Multiple security issues have been fixed in Firefox.
    Identifier: CVE-2025–1932, CVE-2025–1931, CVE-2025–1933, and 5 others
    Affects: Ubuntu 20.04 LTS

  • USN-7330–1: Ansible vulnerabilities: Multiple security issues have been fixed in Ansible.
    Identifier: CVE-2019–14904, CVE-2020–1739, CVE-2020–10729, and 5 others
    Affects: Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM, Ubuntu 14.04 ESM

  • USN-7333–1: Linux kernel vulnerabilities: Multiple security issues have been fixed in the Linux kernel.
    Identifier: CVE-2023–52880, CVE-2022–48994, CVE-2024–36964, and 2 others
    Affects: Ubuntu 14.04 ESM

  • USN-7332–1: Linux kernel vulnerabilities: Multiple security issues have been fixed in the Linux kernel.
    Identifier: CVE-2024–40981, CVE-2024–26685, CVE-2023–52522, and 33 others
    Affects: Ubuntu 16.04 ESM, Ubuntu 14.04 ESM

  • USN-7321–1: Redis vulnerabilities: Multiple security issues have been fixed in Redis.
    Identifier: CVE-2024–46981, CVE-2024–51741, CVE-2024–31228
    Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM, Ubuntu 14.04 ESM

  • USN-7331–1: Linux kernel vulnerabilities: Multiple security issues have been fixed in the Linux kernel.
    Identifier: CVE-2023–52913, CVE-2024–50150, CVE-2024–50233, and 102 others
    Affects: Ubuntu 20.04 LTS

  • USN-7329–1: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
    Identifier: CVE-2025–0927, CVE-2024–50274, CVE-2024–56672, and 1 other
    Affected: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS

  • USN-7328–1: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
    Identifier: CVE-2025–0927, CVE-2024–56672
    Affected: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS

  • USN-7327–1: Linux kernel vulnerability: A security issue has been fixed in the Linux kernel.
    Identifier: CVE-2024–56672
    Affected: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS

  • USN-7326–1: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
    Identifier: CVE-2025–0927, CVE-2024–53104, CVE-2024–53064, and 1 other
    Affected: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS

  • USN-7325–1: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
    Identifier: CVE-2025–0927, CVE-2024–53104
    Affected: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS

  • USN-7324–1: Linux kernel vulnerability: A security issue has been fixed in the Linux kernel.
    Identifier: CVE-2024–53104
    Affected: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS

  • USN-7323–1: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
    Identifier: CVE-2024–56658, CVE-2025–0927, CVE-2024–56672
    Affected: Ubuntu 24.10, Ubuntu 24.04 LTS

  • USN-7322–1: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
    Identifier: CVE-2024–56672, CVE-2024–56658
    Affected: Ubuntu 24.10, Ubuntu 24.04 LTS

  • USN-7320–1: GPAC vulnerabilities: Several security issues have been fixed in GPAC.
    Identifier: CVE-2024–0322, CVE-2024–0321, CVE-2023–5520
    Affected: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM, Ubuntu 14.04 ESM

  • USN-7318–1: SPIP vulnerabilities: Several security issues have been fixed in SPIP.
    Identifier: CVE-2022–28959, CVE-2023–27372, CVE-2024–8517, and 5 others
    Affected: Ubuntu 24.10, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM

  • USN-7319–1: cmark-gfm vulnerabilities: Several security issues have been fixed in cmark-gfm.
    Identifier: CVE-2023–22484, CVE-2022–39209, CVE-2023–26485, and 2 others
    Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS

  • USN-7317–1: wpa_supplicant and hostapd vulnerabilities: wpa_supplicant and hostapd could be made to disclose sensitive information over the network.
    Identifier: CVE-2022–23303, CVE-2022–23304, CVE-2022–37660
    Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS

  • USN-7294–4: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
    Identifier: CVE-2024–49973, CVE-2024–41016, CVE-2024–50287, and 141 others
    Affected: Ubuntu 20.04 LTS

  • USN-7303–3: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
    Identifier: CVE-2024–47738, CVE-2024–50006, CVE-2024–49963, and 205 others
    Affected: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS

  • USN-7316–1: Raptor vulnerabilities: Several security issues have been fixed in Raptor.
    Identifier: CVE-2024–57823, CVE-2020–25713, CVE-2024–57822
    Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS

  • USN-7315–1: PostgreSQL vulnerability: PostgreSQL could be made to execute arbitrary code when it receives specially crafted inputs.
    Identifier: CVE-2025–1094
    Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS

  • USN-7314–1: Kerberos vulnerabilities: Several security issues have been fixed in Kerberos.
    Identifier: CVE-2025–24528, CVE-2024–26462, CVE-2024–26461, and 1 other
    Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS

  • USN-7313–1: Erlang vulnerability: Erlang could be made to consume resources when it receives specially crafted network traffic.
    Identifier: CVE-2025–26618
    Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS

  • USN-7312–1: openNDS vulnerability: openNDS could be made to crash or execute programs when it receives specially crafted network traffic.
    Identifier: CVE-2024–25763
    Affected: Ubuntu 24.10, Ubuntu 24.04 LTS