Hello TUXEDO Fans and Open-Source Enthusiasts!
Our developer TUXes were busy on their last fishing trip and have grabbed the latest updates. With tuxedo-tomte 2.44.0, we can now support InfinityBook Gen9 users even better. And no worries, the keyboard backlighting is back under control after a cold start! Additionally, there are fresh versions of Firefox, Chromium, and Thunderbird. And for all terminal fans: The Fish shell makes typing a pleasure!
Enjoy reading,
The TUXEDO OS Team
We would like to keep you updated on the latest developments in TUXEDO OS with the TWIX series and introduce you to exciting applications as well as practical tips related to the KDE desktop and TUXEDO OS. However, this section should not be a one-way street: your feedback, ideas, and suggestions for improvement are very welcome! For this purpose, we have created a thread on Reddit, where you can reach us directly.
Updates in TUXEDO OS
tuxedo-tomte 2.44.0
New: amdgpu-disable-psr (Panel Self Refresh) for TUXEDO InfinityBook 14/15 AMD Gen9
tuxedo-drivers 4.12.2
Fix: The keyboard backlighting of the IBP Gen9 is not controllable after a cold start until the first press of FN+Space.
Note: This will be the last version officially supported for Ubuntu 22.04. Exceptions may be made for critical bug fixes.
linux v6.11.0–109017.1724 .04.2tux1
Updated to the latest Ubuntu kernel for TUXEDO OS.
Switched from kernel version 6.8 to 6.11 for Ubuntu 24.04.
Other Important Updates
Firefox 135.0.1
Chromium 133.0.6943.98
Thunderbird 128.7.1
WirePlumber 0.5.8
KDE App of the Week: Collection Management with Tellico
A popular saying goes that, at our core, we are hunters and gatherers. However, those who collect a lot can quickly lose track. This is where our KDE App of the Week comes into play: Tellico . This KDE application, available under the GPL for 22 years, allows you to efficiently organize your collections.
Tellico offers a variety of standard templates for different collections, including books, bibliographies, videos, music, video games, coins, stamps, trading cards, board games, comics, and wines. Custom collections are also supported. Browsing collections and filtering views are part of the functionality as well. Additionally, collections can be sorted and grouped by various attributes. Metadata information can be sourced from Amazon or IMDb, and CDDB data for cataloging audio CDs can also be imported.
Tellico is a versatile manager for your collections.
Since version 4.0, Tellico has been transitioned to Qt6. Just a few days ago, version 4.1.1 was released, which updated some data sources and fixed a bug in the ISBN search. You can install Tellico in TUXEDO OS via Discover. The collection manager is also available in the most distributions through their respective package management systems.
Note: You can find more updated KDE apps and news from the KDE developer community from the past week in the column This Week in KDE Apps .
TUXEDO OS Power Tip: Fish – The Next-Generation Shell for Terminal Enthusiasts
Info: In Linux systems, the shell serves as the command center – the cockpit for interaction between the user and the operating system. It is the default tool for issuing commands, managing processes, and automating workflows. While the tried-and-true Bash (B ourne A gain Sh ell) is the standard in TUXEDO OS and most distributions, exciting alternatives like Fish or Zsh offer innovative features.
Bash – a cornerstone of the Linux world. Fast, stable, and a familiar haven for many terminal veterans. However, if you’re looking for a fresh breeze in your terminal routine and value comfort and modern features, you should definitely take a look at the Fish shell. Fish (the F riendly I nteractive SH ell) is more than just a shell – it’s an upgrade for your command line experience. With intelligent features and intuitive operation, Fish elevates working in the terminal to a new level. Installing it on TUXEDO OS is incredibly simple:
sudo apt install fish
To experience Fish in action, there are various ways to do so. For a first test run, you can activate the shell directly in your KDE console. Navigate in the menu (hamburger icon in the top right) to Settings » Configure Konsole… » Profiles . Create a new profile via New… and replace the command in the Command field from /bin/bash to /bin/fish . Then set the newly created profile as the primary shell by selecting Set as Default . The next time you start the console, you will be greeted by the Fish shell.
Fish – More Than Just a Shell: Advantages at a Glance
Fish impresses with user-friendliness, revolutionary autocompletion, and a syntax designed for efficiency. Unlike Bash, which often requires extensive configuration, Fish is designed from the ground up for an optimal user experience – and that’s „out of the box.“ Let’s take a closer look at three core areas where Fish showcases its strengths:
Example 1: Intelligent Autocompletion with Live Preview – Terminal Magic in Real Time
Forget the rudimentary tab completion of Bash. Fish offers an interactive preview that makes typing commands a breeze. For example, if you start with sudo apt u , Fish will present sudo apt update as a suggestion in real time – based on your command history and available system commands.
The highlight: Options and parameters are displayed as you type, without needing to hit the tab key. A press of the tab reveals the full arsenal of parameters with concise descriptions in a clear layout.
Intelligent autocompletion in Fish.
Example 2: Abbreviations and Functions
While Bash syntax and shell configuration can sometimes seem complex and nested, Fish opts for a clear, intuitive structure. Variable assignments and conditional statements are much leaner and more readable in Fish.
Abbreviations Instead of Aliases – Lightning-Fast Commands via Shortcut
Fish bids farewell to traditional aliases and instead presents abbreviations. These allow you to call longer, complex commands with a simple, user-defined shortcut. In the following example, you can use upd8 to perform a comprehensive system update, including updating package sources:
(out)# General syntax for setting an abbreviation:
abbr --add shortcut command
(out)# Example for updating the system:
abbr --add upd8 'sudo apt update && sudo apt full-upgrade'
upd8
To ensure your abbreviations are available after restarting the terminal, save them in the configuration file abbr.fish under ~/.config/fish/conf.d . The easiest way: Use the echo command to write the abbreviation to the file. Alternatively, you can add and edit the file with your favorite text editor.
echo "abbr --add upd8 'sudo apt update && sudo apt full-upgrade'" >> ~/.config/fish/conf.d/abbr.fish
Functions – Limitless Flexibility for Terminal Pros
Functions in Fish are the next evolutionary step in command automation. They offer significantly more flexibility than aliases (or Fish abbreviations) and allow for complex logic. For example, define a function mkcd that creates a directory and navigates into it:
nano ~/.config/fish/functions/mkcd.fish
function mkcd
mkdir -p $argv[1] && cd $argv[1]
end
mkcd testdir
pwd
(out)/home/user/testdir
A Fish function is essentially already a script – this opens up additional possibilities for customization if needed. You can easily store more functions under `~/.config/fish/functions
Ubuntu Security Updates
The security updates listed here from Ubuntu are directly integrated into TUXEDO OS:
USN-7282–1: tomcat7 vulnerabilities : tomcat7 could be triggered to execute arbitrary code.
Identifier: CVE-2017–12616, CVE-2017–12617
Affects: Ubuntu 16.04 ESM
USN-7283–1: Apache Solr vulnerability : Apache Solr could be caused to execute arbitrary code when receiving specially crafted input.
Identifier: CVE-2019–0193
Affects: Ubuntu 18.04 ESM, Ubuntu 16.04 ESM, Ubuntu 14.04 ESM
USN-7275–2: Libtasn1 vulnerability : Libtasn1 could crash when receiving specially crafted network traffic.
Identifier: CVE-2024–12133
Affects: Ubuntu 24.04 LTS
USN-7281–1: GnuTLS vulnerability : GnuTLS could be triggered to consume resources when decoding specially crafted certificates.
Identifier: CVE-2024–12243
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7280–1: Python vulnerability : Python could allow a server-side request forgery (SSRF) attack.
Identifier: CVE-2025–0938
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7279–1: WebKitGTK vulnerabilities : Multiple security issues were fixed in WebKitGTK.
Identifier: CVE-2025–24158, CVE-2025–24150, CVE-2025–24162, and 1 other
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
USN-7278–1: OpenSSL vulnerabilities : Multiple security issues were fixed in OpenSSL.
Identifier: CVE-2024–13176, CVE-2024–9143
Affects: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
LSN-0109–1: Kernel Live Patch Security Notice : Multiple security issues were fixed in the kernel.
Identifier: CVE-2024–26921, CVE-2024–38630, CVE-2024–43882, and 3 others
Affects: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM
USN-7277–1: Linux kernel vulnerabilities : Multiple security issues were fixed in the kernel.
Identifier: CVE-2024–47738, CVE-2024–50006, CVE-2024–50040, and 754 others
Affects: Ubuntu 24.10
USN-7276–1: Linux kernel vulnerabilities : Multiple security issues were fixed in the kernel.
Identifier: CVE-2024–49996, CVE-2024–50200, CVE-2024–53193, and 755 others
Affects: Ubuntu 24.10
USN-7275–1: Libtasn1 vulnerability : Libtasn1 could crash when receiving specially crafted network traffic.
Identifier: CVE-2024–12133
Affects: Ubuntu 24.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7270–2: OpenSSH vulnerability : OpenSSH could be triggered to bypass server identity verification.
Identifier: CVE-2025–26465
Affects: Ubuntu 18.04 ESM, Ubuntu 16.04 ESM
USN-7274–1: Atril vulnerabilities : Atril could crash or execute programs as your login when opening a specially crafted file.
Identifier: CVE-2023–51698, CVE-2019–11459, CVE-2019–1010006
Affects: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM
USN-7273–1: libsndfile vulnerabilities : Multiple security issues were fixed in libsndfile.
Identifier: CVE-2021–4156, CVE-2024–50612
Affects: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 14.04 ESM
USN-7272–1: Symfony vulnerabilities : Multiple security issues were fixed in Symfony.
Identifier: CVE-2022–24895, CVE-2022–24894, CVE-2023–46734, and 6 others
Affects: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7271–1: virtualenv vulnerability : python-virtualenv could crash or execute programs as your login when opening a specially crafted file.
Identifier: CVE-2024–53899
Affects: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7270–1: OpenSSH vulnerabilities : Multiple security issues were fixed in OpenSSH.
Identifier: CVE-2025–26465, CVE-2025–26466
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7161–2: Docker vulnerabilities : Multiple security issues in Docker were fixed.
Identifier: CVE-2024–29018, CVE-2024–41110
Affects: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM
USN-7269–1: Intel Microcode vulnerabilities : Multiple security issues were fixed in Intel Microcode.
Identifier: CVE-2024–36293, CVE-2024–39279, CVE-2024–31068
Affects: Ubuntu 24.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM
Current BIOS/EC Versions
An EC/BIOS update affects key system components. Please ensure that you follow the instructions carefully and take your time. The process is usually completed quickly. If you have any doubts, our support team is happy to assist you. The following devices have BIOS/EC updates available:
Model
CPU
GPU
BIOS
EC
InfinityFlex 14 - Gen1
V07
4.24
Pulse 15 - Gen2
N.1.60A14
1.19.20
XUX708
1.07.29RTR
1.07.16
XUX709
1.07.29RTR
1.07.16