Hello TUXEDO fans and open-source enthusiasts!
While the KDE developers are diligently working on the latest version of the Plasma desktop, our developer penguins at TUXEDO Computers have been busy crafting new updates. This week, there are fresh packages for TUXEDO OS, a polished KDE Plasma, and a security-optimized Firefox – all open-source and penguin-friendly, of course. So buckle up, warm up your typing fingers, and dive into the latest developments with us!
Enjoy reading,
The TUXEDO OS Team
We would like to keep you updated on the latest developments in TUXEDO OS with the TWIX series and introduce you to exciting applications as well as practical tips related to the KDE desktop and TUXEDO OS. However, this section should not be a one-way street: your feedback, ideas, and suggestions for improvement are very welcome! For this purpose, we have set up a thread on Reddit where you can reach us directly.
Latest News from Our Blog
Updates in TUXEDO OS
In the TUXEDO OS Repositories
Plasma 6.3.2
Frameworks 6.11.0
Gear 24.12.2
Qt 6.8.2
New ISO Image for TUXEDO OS
Plasma 6.3.2
Frameworks 6.11.0
Gear 24.12.2
Qt 6.8.2
All Ubuntu and TUXEDO updates up to today
tuxedo-tomte 2.45.1
Added support for Linux Mint 22.1
Changes for all Linux Mint versions:
Tomte no longer modifies the Linux Mint-specific repository entries.
Our Ubuntu mirror repositories will no longer be listed in Linux Mint; the tuxedo-mirrors module will not be installed.
Custom repository entries will remain unchanged during an update.
The tuxedo-repos module will be listed and corrected if modified by the user.
Firefox 135.0.1~tux4
To enhance security and strengthen user privacy, we have decided to implement the following changes to Firefox:
Option to Tell websites not to sell or share my data enabled by default
Scripting in the PDF viewer disabled
OpenH264 plugin disabled (Security vulnerability in Cisco codec )
New tab page now shows a blank page (no more ads)
Pocket integration disabled
We have summarized more information in this article.
KDE App of the Week: Podcast Management with Kasts
Podcasts are a popular way to stay updated on various topics, both professionally and personally. KDE offers a versatile podcast application called Kasts , which is available for Linux, Android, and Windows, and performs well on both desktop and mobile devices.
Kasts provides everything needed for playing and managing podcasts.
Features at a Glance
Kasts comes with all the essential features you would expect from a modern podcast app:
Management of episodes through the playback queue
Synchronization of playback position with other clients via gpodder.net or gpodder-nextcloud
Adjustable playback speed
Search for podcasts by name or keyword
Deep system integration, including automatic suppression of system interruptions during playback
Synchronization for Seamless Listening
With Kasts, you can easily listen to podcasts at home on your computer and seamlessly continue on your smartphone or in your car. Synchronization between different devices is done through the web services gpodder.net or nextcloud-gpodder .
In the settings under Sync , you can select your desired provider.
Installation
Kasts is available in the package repositories of most Linux distributions. Alternatively, the app can be installed as a Flatpak or Snap . Android users can find Kasts through F-Droid .
You can find an overview of the latest developments and updated KDE apps from the past week in the column This Week in KDE Apps by the KDE developer community.
TUXEDO OS Tips & Tricks: The Middle Mouse Button
The middle mouse button was introduced in the 1980s to provide additional functionality. In Windows, the middle mouse button is often used for scrolling, while in Linux, it often has different functions that we would like to explain here.
Scrolling in KDE with the Middle Mouse Button
KDE Plasma offers a similar function for KDE apps like Konsole, Dolphin, or the text editor Kate. To enable this, go to System Settings » Mouse & Touchpad » Mouse and activate the option Press middle button and move mouse to scroll for the desired device. Now, click the middle mouse button in a scrollable area (such as a folder view in Dolphin) and hold it down; you can then move the content of the display up or down with a mouse movement.
Mouse Clicks in KDE Plasma
On laptops with a touchpad, KDE Plasma offers various gestures. For example, you can scroll through a webpage by swiping up or down with two fingers on the touchpad. Optionally, you can change the Scrolling setting to Touchpad edges under System Settings » Mouse & Touchpad » Touchpad . This allows you to scroll by moving your finger along the right edge of the touchpad.
Tapping
One finger: Left mouse click
Two fingers: Right mouse click
Three fingers: Middle mouse click
Tapping and Dragging
One finger: Move cursor
Two fingers: Move view (e.g., in an image viewer or image editing software like GIMP)
Three fingers: Not yet implemented for KDE 6.x, but custom gestures and actions can be implemented using KWin Gestures .
Executing and Opening in KDE Dolphin
Previously, the Dolphin file manager in the KDE desktop environment opened and executed files by default with a single click. However, with the introduction of KDE Plasma 6 , KDE has adopted the common double-click behavior. A single left click now selects files and folders.
To open a file or folder, simply double-click it. Alternatively, you can also click once with the middle mouse button. If you want to restore the previous behavior, change the option Clicking files and folders from Selects them to Opens them in System Settings under Workspace » General Behavior .
Middle Mouse Button in Firefox
In Firefox, clicking a link with the middle mouse button automatically opens the linked page in a new background tab. This way, you can read a Wikipedia article without interruption and look up the linked sources later at your convenience.
Additionally, the middle mouse button can be equipped with a handy scroll function: Enable the Use autoscrolling option in the Application Menu under Settings » Browsing (enabled by default in TUXEDO OS). Then, hold down the middle mouse button and move the mouse up or down to scroll comfortably through the current page.
For those who prefer not to use the mouse wheel for scrolling on websites but also want to keep their fingers on the mouse, Firefox’s auto-scroll feature is a great option.
Panning in GIMP, Inkscape, and More
A typical use case for the middle mouse button is moving content in image viewers, image editing programs, and graphic tools. For example, when you open an image in Gwenview, the image viewer of KDE Plasma, you can zoom into the image by holding down the Ctrl key and using the mouse wheel – or alternatively, by using the zoom slider in the status bar.
To move the view (known as Panning ), hold down the middle mouse button and move the mouse. This control works similarly in programs like GIMP or Inkscape. Other applications, including the 3D rendering tool Blender and painting programs like Krita and MyPaint, use the middle mouse button for the zoom function instead.
Copy & Paste in All Situations
A typical Linux feature is copying and pasting text using the middle mouse button – without the need for keyboard shortcuts like Ctrl+C or Ctrl+V, allowing your hand to stay on the mouse. In Linux jargon, a distinction is made between selection and clipboard. Simply highlight a word or text and paste it at the desired location by clicking with the middle mouse button.
To highlight, you can either use the left mouse button or double-click a word to select it completely. A triple left-click, on the other hand, highlights the entire paragraph. This function is particularly handy in the terminal: for example, you can display the contents of a directory using the command ls
Note: In Linux jargon, the different storage types are referred to as selection and clipboard (Ctrl+C, Ctrl+V). They differ not only in usage but also in their contents. What you copy to the clipboard with Ctrl+C cannot be automatically pasted with the middle mouse button.
KDE Plasma offers the option to synchronize both storage types. To do this, click on the clipboard icon in the status bar (it appears once you have copied something). Then, in the popup window, click on the Configure clipboard… switch and enable the option Keep the selection and clipboard the same .
KDE allows synchronization of the selection and clipboard buffers. This way, you also have a history available for both storage types.
Security Updates Ubuntu
The security updates listed here are directly integrated into TUXEDO OS:
USN-7294–2: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–50006, CVE-2024–50040, CVE-2024–50096, and 141 others
Affected: Ubuntu 20.04 LTS, Ubuntu 18.04 ESM
USN-7308–1: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–53103, CVE-2024–50278, CVE-2024–50150, and 103 others
Affected: Ubuntu 22.04 LTS
USN-7289–4: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–50245, CVE-2024–50257, CVE-2024–39497, and 100 others
Affected: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7207–2: Git vulnerabilities : Several security issues have been fixed in Git.
Identifier: CVE-2024–52006, CVE-2024–50349
Affected: Ubuntu 20.04 LTS
USN-7307–1: xmltok library vulnerability : Libxmltok could be crashed when opening a specially crafted file.
Identifier: CVE-2012–1148
Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM
USN-7294–1: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–50006, CVE-2024–50040, CVE-2024–50096, and 141 others
Affected: Ubuntu 20.04 LTS, Ubuntu 18.04 ESM
USN-7295–1: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–50301, CVE-2024–47747, CVE-2024–50033, and 146 others
Affected: Ubuntu 20.04 LTS
USN-7291–1: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–50245, CVE-2024–50257, CVE-2024–39497, and 100 others
Affected: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7306–1: GNU binutils vulnerabilities : Several security issues have been fixed in binutils.
Identifier: CVE-2025–0840, CVE-2024–57360
Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7293–1: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–50301, CVE-2024–47747, CVE-2024–50033, and 142 others
Affected: Ubuntu 20.04 LTS, Ubuntu 18.04 ESM
USN-7305–1: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–50245, CVE-2024–50257, CVE-2024–39497, and 100 others
Affected: Ubuntu 22.04 LTS
USN-7304–1: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–47738, CVE-2024–50006, CVE-2024–49963, and 207 others
Affected: Ubuntu 24.04 LTS
USN-7303–1: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–47733, CVE-2024–49874, CVE-2024–47743, and 205 others
Affected: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
USN-7049–3: PHP vulnerabilities : Several security issues have been fixed in PHP.
Identifier: CVE-2024–8925, CVE-2024–8927
Affected: Ubuntu 14.04 ESM
USN-7302–1: libxml2 vulnerabilities : Several security issues have been fixed in libxml2.
Identifier: CVE-2022–49043, CVE-2025–24928, CVE-2025–27113, and 2 others
Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM, Ubuntu 14.04 ESM
USN-7289–3: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–50154, CVE-2024–50301, CVE-2024–50083, and 100 others
Affected: Ubuntu 22.04 LTS
USN-7301–1: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–47738, CVE-2024–50006, CVE-2024–49963, and 206 others
Affected: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
USN-7300–1: Linux kernel vulnerability : The system could be crashed or programs could be executed as an administrator.
Identifier: CVE-2025–0927
Affected: Ubuntu 14.04 ESM
USN-7299–1: X.Org X Server vulnerabilities : Several security issues have been fixed in X.Org.
Identifier: CVE-2025–26595, CVE-2025–26597, CVE-2025–26599, and 5 others
Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7298–1: Linux kernel vulnerability : The system could be crashed or programs could be executed as an administrator.
Identifier: CVE-2025–0927
Affected: Ubuntu 16.04 ESM, Ubuntu 14.04 ESM
USN-7297–1: ProFTPD vulnerabilities : Several security issues have been fixed in proftpd-dfsg.
Identifier: CVE-2023–48795, CVE-2024–48651, CVE-2023–51713
Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7234–5: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–53103, CVE-2024–53164, CVE-2024–53141, and 2 others
Affected: Ubuntu 18.04 ESM
USN-7290–1: Rails vulnerabilities : Several security issues have been fixed in Rails.
Identifier: CVE-2024–47887, CVE-2024–41128, CVE-2024–47889, and 1 other
Affected: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM
USN-7271–2: virtualenv vulnerability : virtualenv could be crashed or execute programs as your login when opening a specially crafted file.
Identifier: CVE-2024–53899
Affected: Ubuntu 24.04 LTS
USN-7296–1: Linux kernel vulnerability : The system could be crashed or programs could be executed as an administrator.
Identifier: CVE-2025–0927
Affected: Ubuntu 18.04 ESM, Ubuntu 16.04 ESM
USN-7292–1: Dropbear vulnerabilities : Several security issues have been fixed in dropbear.
Identifier: CVE-2021–36369, CVE-2023–48795
Affected: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM
USN-7289–2: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–50154, CVE-2024–50301, CVE-2024–50083, and 100 others
Affected: Ubuntu 20.04 LTS
USN-7288–2: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–50154, CVE-2024–50301, CVE-2024–50083, and 101 others
Affected: Ubuntu 20.04 LTS
USN-7267–2: libsndfile vulnerability : libsndfile could be crashed when opening a specially crafted file.
Identifier: CVE-2024–50612
Affected: Ubuntu 24.10, Ubuntu 24.04 LTS
USN-7262–2: Linux kernel (KVM) vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–41020, CVE-2024–41066, CVE-2024–42252, and 7 others
Affected: Ubuntu 16.04 ESM
USN-7289–1: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–50036, CVE-2024–50208, CVE-2024–50072, and 100 others
Affected: Ubuntu 22.04 LTS
USN-7288–1: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–50036, CVE-2024–50208, CVE-2024–50072, and 101 others
Affected: Ubuntu 22.04 LTS
USN-7287–1: libcap2 vulnerability : libcap2 could grant unwanted capabilities.
Identifier: CVE-2025–1390
Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7286–1: iniParser vulnerability : iniparser could be crashed when opening a specially crafted file.
Identifier: CVE-2025–0633
Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
USN-7285–1: nginx vulnerability : Several security issues have been fixed in nginx.
Identifier: CVE-2025–23419
Affected: Ubuntu 24.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7269–2: Intel Microcode vulnerabilities : Several security issues have been fixed in Intel Microcode.
Identifier: CVE-2024–39279, CVE-2024–36293, CVE-2024–31068
Affected: Ubuntu 24.04 LTS
USN-7284–1: Netty vulnerabilities : Several security issues have been fixed in Netty.
Identifier: CVE-2022–24823, CVE-2024–29025
Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM