Spring is here, and our developer penguins are working up quite a sweat. But despite slippery flippers and steaming terminals, they have once again done a great job: Firefox 136 brings vertical tabs and better hardware support. We also take a look at the KDE Partition Manager, which helps with neatly organizing hard drives, and show you how to get rid of a particularly sticky „Edge Barrier.“
If you’ve been using Linux for a while, you’re probably familiar with the partitioning tool GParted, also known as the GNOME Partition Editor. Less known, however, is that KDE also provides a powerful tool for managing storage devices: KDE Partition Manager.
KDE Partition Manager is a utility for managing disks, partitions, and file systems on your computer. It allows you to create, copy, move, delete, back up, restore, and resize partitions – all without data loss. It supports numerous file systems, including EXT2/3/4, Btrfs, XFS, NTFS, and FAT16/32.
In the world of open-source software, changes are often welcome but can also bring unexpected challenges. One example is the new default option „Edge Barrier,“ introduced in a recent KDE update here.
This feature was designed to help users access a vertical auto-hide panel more easily in multi-monitor setups. However, it can also significantly hinder multi-screen usage by making it harder to move the mouse between displays. In this guide, we’ll show you how to adjust this setting to restore the smooth display transition you’re accustomed to.
After updating to on of the latest versions of KDE, you might notice that the „Edge Barrier“ feature is enabled. This causes the mouse to „stick“ at screen edges when moving between monitors. This can be frustrating, especially if you frequently switch between screens. Note that this feature is only active under Wayland. Users working with X11 are not affected and won’t notice any changes.
-
USN-7323–2: Linux kernel vulnerabilities: Multiple security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–56672, CVE-2024–56658, CVE-2025–0927
Affects: Ubuntu 24.10
-
USN-7334–1: Firefox vulnerabilities: Multiple security issues have been fixed in Firefox.
Identifier: CVE-2025–1932, CVE-2025–1931, CVE-2025–1933, and 5 others
Affects: Ubuntu 20.04 LTS
-
USN-7330–1: Ansible vulnerabilities: Multiple security issues have been fixed in Ansible.
Identifier: CVE-2019–14904, CVE-2020–1739, CVE-2020–10729, and 5 others
Affects: Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM, Ubuntu 14.04 ESM
-
USN-7333–1: Linux kernel vulnerabilities: Multiple security issues have been fixed in the Linux kernel.
Identifier: CVE-2023–52880, CVE-2022–48994, CVE-2024–36964, and 2 others
Affects: Ubuntu 14.04 ESM
-
USN-7332–1: Linux kernel vulnerabilities: Multiple security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–40981, CVE-2024–26685, CVE-2023–52522, and 33 others
Affects: Ubuntu 16.04 ESM, Ubuntu 14.04 ESM
-
USN-7321–1: Redis vulnerabilities: Multiple security issues have been fixed in Redis.
Identifier: CVE-2024–46981, CVE-2024–51741, CVE-2024–31228
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM, Ubuntu 14.04 ESM
-
USN-7331–1: Linux kernel vulnerabilities: Multiple security issues have been fixed in the Linux kernel.
Identifier: CVE-2023–52913, CVE-2024–50150, CVE-2024–50233, and 102 others
Affects: Ubuntu 20.04 LTS
-
USN-7329–1: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2025–0927, CVE-2024–50274, CVE-2024–56672, and 1 other
Affected: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
-
USN-7328–1: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2025–0927, CVE-2024–56672
Affected: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
-
USN-7327–1: Linux kernel vulnerability: A security issue has been fixed in the Linux kernel.
Identifier: CVE-2024–56672
Affected: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
-
USN-7326–1: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2025–0927, CVE-2024–53104, CVE-2024–53064, and 1 other
Affected: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
-
USN-7325–1: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2025–0927, CVE-2024–53104
Affected: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
-
USN-7324–1: Linux kernel vulnerability: A security issue has been fixed in the Linux kernel.
Identifier: CVE-2024–53104
Affected: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
-
USN-7323–1: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–56658, CVE-2025–0927, CVE-2024–56672
Affected: Ubuntu 24.10, Ubuntu 24.04 LTS
-
USN-7322–1: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–56672, CVE-2024–56658
Affected: Ubuntu 24.10, Ubuntu 24.04 LTS
-
USN-7320–1: GPAC vulnerabilities: Several security issues have been fixed in GPAC.
Identifier: CVE-2024–0322, CVE-2024–0321, CVE-2023–5520
Affected: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM, Ubuntu 14.04 ESM
-
USN-7318–1: SPIP vulnerabilities: Several security issues have been fixed in SPIP.
Identifier: CVE-2022–28959, CVE-2023–27372, CVE-2024–8517, and 5 others
Affected: Ubuntu 24.10, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM
-
USN-7319–1: cmark-gfm vulnerabilities: Several security issues have been fixed in cmark-gfm.
Identifier: CVE-2023–22484, CVE-2022–39209, CVE-2023–26485, and 2 others
Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
-
USN-7317–1: wpa_supplicant and hostapd vulnerabilities: wpa_supplicant and hostapd could be made to disclose sensitive information over the network.
Identifier: CVE-2022–23303, CVE-2022–23304, CVE-2022–37660
Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
-
USN-7294–4: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–49973, CVE-2024–41016, CVE-2024–50287, and 141 others
Affected: Ubuntu 20.04 LTS
-
USN-7303–3: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–47738, CVE-2024–50006, CVE-2024–49963, and 205 others
Affected: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
-
USN-7316–1: Raptor vulnerabilities: Several security issues have been fixed in Raptor.
Identifier: CVE-2024–57823, CVE-2020–25713, CVE-2024–57822
Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
-
USN-7315–1: PostgreSQL vulnerability: PostgreSQL could be made to execute arbitrary code when it receives specially crafted inputs.
Identifier: CVE-2025–1094
Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
-
USN-7314–1: Kerberos vulnerabilities: Several security issues have been fixed in Kerberos.
Identifier: CVE-2025–24528, CVE-2024–26462, CVE-2024–26461, and 1 other
Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
-
USN-7313–1: Erlang vulnerability: Erlang could be made to consume resources when it receives specially crafted network traffic.
Identifier: CVE-2025–26618
Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
-
USN-7312–1: openNDS vulnerability: openNDS could be made to crash or execute programs when it receives specially crafted network traffic.
Identifier: CVE-2024–25763
Affected: Ubuntu 24.10, Ubuntu 24.04 LTS