This Week in TUXEDO OS #09-2025 - TUXEDO Computers

  ATTENTION: To use our store you have to activate JavaScript and deactivate script blockers!  
Thank you for your understanding!

This Week in TUXEDO OS #09-2025

Hello TUXEDO fans and open-source enthusiasts!

While the KDE developers are diligently working on the latest version of the Plasma desktop, our developer penguins at TUXEDO Computers have been busy crafting new updates. This week, there are fresh packages for TUXEDO OS, a polished KDE Plasma, and a security-optimized Firefox – all open-source and penguin-friendly, of course. So buckle up, warm up your typing fingers, and dive into the latest developments with us!

Enjoy reading,
The TUXEDO OS Team

We would like to keep you updated on the latest developments in TUXEDO OS with the TWIX series and introduce you to exciting applications as well as practical tips related to the KDE desktop and TUXEDO OS. However, this section should not be a one-way street: your feedback, ideas, and suggestions for improvement are very welcome! For this purpose, we have set up a thread on Reddit where you can reach us directly.

Latest News from Our Blog

Updates in TUXEDO OS

In the TUXEDO OS Repositories

  • Plasma 6.3.2
  • Frameworks 6.11.0
  • Gear 24.12.2
  • Qt 6.8.2

New ISO Image for TUXEDO OS

  • Plasma 6.3.2
  • Frameworks 6.11.0
  • Gear 24.12.2
  • Qt 6.8.2
  • All Ubuntu and TUXEDO updates up to today

tuxedo-tomte 2.45.1

  • Added support for Linux Mint 22.1
  • Changes for all Linux Mint versions:
  • Tomte no longer modifies the Linux Mint-specific repository entries.
  • Our Ubuntu mirror repositories will no longer be listed in Linux Mint; the tuxedo-mirrors module will not be installed.
  • Custom repository entries will remain unchanged during an update.
  • The tuxedo-repos module will be listed and corrected if modified by the user.

Firefox 135.0.1~tux4

To enhance security and strengthen user privacy, we have decided to implement the following changes to Firefox:

  • Option to Tell websites not to sell or share my data enabled by default
  • Scripting in the PDF viewer disabled
  • OpenH264 plugin disabled (Security vulnerability in Cisco codec)
  • New tab page now shows a blank page (no more ads)
  • Pocket integration disabled

We have summarized more information in this article.

KDE App of the Week: Podcast Management with Kasts

Podcasts are a popular way to stay updated on various topics, both professionally and personally. KDE offers a versatile podcast application called Kasts, which is available for Linux, Android, and Windows, and performs well on both desktop and mobile devices.

Features at a Glance

Kasts comes with all the essential features you would expect from a modern podcast app:

  • Management of episodes through the playback queue
  • Synchronization of playback position with other clients via gpodder.net or gpodder-nextcloud
  • Adjustable playback speed
  • Search for podcasts by name or keyword
  • Deep system integration, including automatic suppression of system interruptions during playback

Synchronization for Seamless Listening

With Kasts, you can easily listen to podcasts at home on your computer and seamlessly continue on your smartphone or in your car. Synchronization between different devices is done through the web services gpodder.net or nextcloud-gpodder.

Installation

Kasts is available in the package repositories of most Linux distributions. Alternatively, the app can be installed as a Flatpak or Snap. Android users can find Kasts through F-Droid.

You can find an overview of the latest developments and updated KDE apps from the past week in the column This Week in KDE Apps by the KDE developer community.

TUXEDO OS Tips & Tricks: The Middle Mouse Button

The middle mouse button was introduced in the 1980s to provide additional functionality. In Windows, the middle mouse button is often used for scrolling, while in Linux, it often has different functions that we would like to explain here.

Scrolling in KDE with the Middle Mouse Button

KDE Plasma offers a similar function for KDE apps like Konsole, Dolphin, or the text editor Kate. To enable this, go to System Settings » Mouse & Touchpad » Mouse and activate the option Press middle button and move mouse to scroll for the desired device. Now, click the middle mouse button in a scrollable area (such as a folder view in Dolphin) and hold it down; you can then move the content of the display up or down with a mouse movement.

Mouse Clicks in KDE Plasma

On laptops with a touchpad, KDE Plasma offers various gestures. For example, you can scroll through a webpage by swiping up or down with two fingers on the touchpad. Optionally, you can change the Scrolling setting to Touchpad edges under System Settings » Mouse & Touchpad » Touchpad. This allows you to scroll by moving your finger along the right edge of the touchpad.

Tapping
  • One finger: Left mouse click
  • Two fingers: Right mouse click
  • Three fingers: Middle mouse click
Tapping and Dragging
  • One finger: Move cursor
  • Two fingers: Move view (e.g., in an image viewer or image editing software like GIMP)
  • Three fingers: Not yet implemented for KDE 6.x, but custom gestures and actions can be implemented using KWin Gestures.

Executing and Opening in KDE Dolphin

Previously, the Dolphin file manager in the KDE desktop environment opened and executed files by default with a single click. However, with the introduction of KDE Plasma 6, KDE has adopted the common double-click behavior. A single left click now selects files and folders.

To open a file or folder, simply double-click it. Alternatively, you can also click once with the middle mouse button. If you want to restore the previous behavior, change the option Clicking files and folders from Selects them to Opens them in System Settings under Workspace » General Behavior.

Middle Mouse Button in Firefox

In Firefox, clicking a link with the middle mouse button automatically opens the linked page in a new background tab. This way, you can read a Wikipedia article without interruption and look up the linked sources later at your convenience.

Additionally, the middle mouse button can be equipped with a handy scroll function: Enable the Use autoscrolling option in the Application Menu under Settings » Browsing (enabled by default in TUXEDO OS). Then, hold down the middle mouse button and move the mouse up or down to scroll comfortably through the current page.

Panning in GIMP, Inkscape, and More

A typical use case for the middle mouse button is moving content in image viewers, image editing programs, and graphic tools. For example, when you open an image in Gwenview, the image viewer of KDE Plasma, you can zoom into the image by holding down the Ctrl key and using the mouse wheel – or alternatively, by using the zoom slider in the status bar.

To move the view (known as Panning), hold down the middle mouse button and move the mouse. This control works similarly in programs like GIMP or Inkscape. Other applications, including the 3D rendering tool Blender and painting programs like Krita and MyPaint, use the middle mouse button for the zoom function instead.

Copy & Paste in All Situations

A typical Linux feature is copying and pasting text using the middle mouse button – without the need for keyboard shortcuts like Ctrl+C or Ctrl+V, allowing your hand to stay on the mouse. In Linux jargon, a distinction is made between selection and clipboard. Simply highlight a word or text and paste it at the desired location by clicking with the middle mouse button.

To highlight, you can either use the left mouse button or double-click a word to select it completely. A triple left-click, on the other hand, highlights the entire paragraph. This function is particularly handy in the terminal: for example, you can display the contents of a directory using the command ls

Note: In Linux jargon, the different storage types are referred to as selection and clipboard (Ctrl+C, Ctrl+V). They differ not only in usage but also in their contents. What you copy to the clipboard with Ctrl+C cannot be automatically pasted with the middle mouse button.

KDE Plasma offers the option to synchronize both storage types. To do this, click on the clipboard icon in the status bar (it appears once you have copied something). Then, in the popup window, click on the Configure clipboard… switch and enable the option Keep the selection and clipboard the same.

Security Updates Ubuntu

The security updates listed here are directly integrated into TUXEDO OS:

  • USN-7294–2: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
    Identifier: CVE-2024–50006, CVE-2024–50040, CVE-2024–50096, and 141 others
    Affected: Ubuntu 20.04 LTS, Ubuntu 18.04 ESM

  • USN-7308–1: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
    Identifier: CVE-2024–53103, CVE-2024–50278, CVE-2024–50150, and 103 others
    Affected: Ubuntu 22.04 LTS

  • USN-7289–4: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
    Identifier: CVE-2024–50245, CVE-2024–50257, CVE-2024–39497, and 100 others
    Affected: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS

  • USN-7207–2: Git vulnerabilities: Several security issues have been fixed in Git.
    Identifier: CVE-2024–52006, CVE-2024–50349
    Affected: Ubuntu 20.04 LTS

  • USN-7307–1: xmltok library vulnerability: Libxmltok could be crashed when opening a specially crafted file.
    Identifier: CVE-2012–1148
    Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM

  • USN-7294–1: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
    Identifier: CVE-2024–50006, CVE-2024–50040, CVE-2024–50096, and 141 others
    Affected: Ubuntu 20.04 LTS, Ubuntu 18.04 ESM

  • USN-7295–1: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
    Identifier: CVE-2024–50301, CVE-2024–47747, CVE-2024–50033, and 146 others
    Affected: Ubuntu 20.04 LTS

  • USN-7291–1: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
    Identifier: CVE-2024–50245, CVE-2024–50257, CVE-2024–39497, and 100 others
    Affected: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS

  • USN-7306–1: GNU binutils vulnerabilities: Several security issues have been fixed in binutils.
    Identifier: CVE-2025–0840, CVE-2024–57360
    Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS

  • USN-7293–1: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
    Identifier: CVE-2024–50301, CVE-2024–47747, CVE-2024–50033, and 142 others
    Affected: Ubuntu 20.04 LTS, Ubuntu 18.04 ESM

  • USN-7305–1: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
    Identifier: CVE-2024–50245, CVE-2024–50257, CVE-2024–39497, and 100 others
    Affected: Ubuntu 22.04 LTS

  • USN-7304–1: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
    Identifier: CVE-2024–47738, CVE-2024–50006, CVE-2024–49963, and 207 others
    Affected: Ubuntu 24.04 LTS

  • USN-7303–1: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
    Identifier: CVE-2024–47733, CVE-2024–49874, CVE-2024–47743, and 205 others
    Affected: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS

  • USN-7049–3: PHP vulnerabilities: Several security issues have been fixed in PHP.
    Identifier: CVE-2024–8925, CVE-2024–8927
    Affected: Ubuntu 14.04 ESM

  • USN-7302–1: libxml2 vulnerabilities: Several security issues have been fixed in libxml2.
    Identifier: CVE-2022–49043, CVE-2025–24928, CVE-2025–27113, and 2 others
    Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM, Ubuntu 14.04 ESM

  • USN-7289–3: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
    Identifier: CVE-2024–50154, CVE-2024–50301, CVE-2024–50083, and 100 others
    Affected: Ubuntu 22.04 LTS

  • USN-7301–1: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
    Identifier: CVE-2024–47738, CVE-2024–50006, CVE-2024–49963, and 206 others
    Affected: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS

  • USN-7300–1: Linux kernel vulnerability: The system could be crashed or programs could be executed as an administrator.
    Identifier: CVE-2025–0927
    Affected: Ubuntu 14.04 ESM

  • USN-7299–1: X.Org X Server vulnerabilities: Several security issues have been fixed in X.Org.
    Identifier: CVE-2025–26595, CVE-2025–26597, CVE-2025–26599, and 5 others
    Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS

  • USN-7298–1: Linux kernel vulnerability: The system could be crashed or programs could be executed as an administrator.
    Identifier: CVE-2025–0927
    Affected: Ubuntu 16.04 ESM, Ubuntu 14.04 ESM

  • USN-7297–1: ProFTPD vulnerabilities: Several security issues have been fixed in proftpd-dfsg.
    Identifier: CVE-2023–48795, CVE-2024–48651, CVE-2023–51713
    Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS

  • USN-7234–5: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
    Identifier: CVE-2024–53103, CVE-2024–53164, CVE-2024–53141, and 2 others
    Affected: Ubuntu 18.04 ESM

  • USN-7290–1: Rails vulnerabilities: Several security issues have been fixed in Rails.
    Identifier: CVE-2024–47887, CVE-2024–41128, CVE-2024–47889, and 1 other
    Affected: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM

  • USN-7271–2: virtualenv vulnerability: virtualenv could be crashed or execute programs as your login when opening a specially crafted file.
    Identifier: CVE-2024–53899
    Affected: Ubuntu 24.04 LTS

  • USN-7296–1: Linux kernel vulnerability: The system could be crashed or programs could be executed as an administrator.
    Identifier: CVE-2025–0927
    Affected: Ubuntu 18.04 ESM, Ubuntu 16.04 ESM

  • USN-7292–1: Dropbear vulnerabilities: Several security issues have been fixed in dropbear.
    Identifier: CVE-2021–36369, CVE-2023–48795
    Affected: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM

  • USN-7289–2: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
    Identifier: CVE-2024–50154, CVE-2024–50301, CVE-2024–50083, and 100 others
    Affected: Ubuntu 20.04 LTS

  • USN-7288–2: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
    Identifier: CVE-2024–50154, CVE-2024–50301, CVE-2024–50083, and 101 others
    Affected: Ubuntu 20.04 LTS

  • USN-7267–2: libsndfile vulnerability: libsndfile could be crashed when opening a specially crafted file.
    Identifier: CVE-2024–50612
    Affected: Ubuntu 24.10, Ubuntu 24.04 LTS

  • USN-7262–2: Linux kernel (KVM) vulnerabilities: Several security issues have been fixed in the Linux kernel.
    Identifier: CVE-2024–41020, CVE-2024–41066, CVE-2024–42252, and 7 others
    Affected: Ubuntu 16.04 ESM

  • USN-7289–1: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
    Identifier: CVE-2024–50036, CVE-2024–50208, CVE-2024–50072, and 100 others
    Affected: Ubuntu 22.04 LTS

  • USN-7288–1: Linux kernel vulnerabilities: Several security issues have been fixed in the Linux kernel.
    Identifier: CVE-2024–50036, CVE-2024–50208, CVE-2024–50072, and 101 others
    Affected: Ubuntu 22.04 LTS

  • USN-7287–1: libcap2 vulnerability: libcap2 could grant unwanted capabilities.
    Identifier: CVE-2025–1390
    Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS

  • USN-7286–1: iniParser vulnerability: iniparser could be crashed when opening a specially crafted file.
    Identifier: CVE-2025–0633
    Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS

  • USN-7285–1: nginx vulnerability: Several security issues have been fixed in nginx.
    Identifier: CVE-2025–23419
    Affected: Ubuntu 24.10, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS

  • USN-7269–2: Intel Microcode vulnerabilities: Several security issues have been fixed in Intel Microcode.
    Identifier: CVE-2024–39279, CVE-2024–36293, CVE-2024–31068
    Affected: Ubuntu 24.04 LTS

  • USN-7284–1: Netty vulnerabilities: Several security issues have been fixed in Netty.
    Identifier: CVE-2022–24823, CVE-2024–29025
    Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM