Hello TUXEDO fans and open-source enthusiasts!
Our developer penguins have been working at full speed—tweaking the kernel, polishing Tomte, and scrubbing so much code that spring cleaning is practically done! But things are heating up: only one more week of winter, and then not only the ice will melt, but also the excuse to postpone updates. So grab the latest improvements in TUXEDO OS before our penguins waddle you out of winter lethargy with a loud splash!
Enjoy the read, The TUXEDO OS Team
We would like to keep you updated on the latest developments in TUXEDO OS with the TWIX series and introduce you to exciting applications as well as practical tips related to the KDE desktop and TUXEDO OS. However, this section should not be a one-way street: your feedback, ideas, and suggestions for improvement are very welcome! For this purpose, we have created a thread on Reddit, where you can reach us directly.
Latest News and Information
TUXEDO OS Updates
tuxedo-tomte 2.46.0
The tuxedo-bt-off-suspend module now supports the TUXEDO Nano Pro Gen12 (Board name: 4X4–7040 Series/D5)
Numerous minor fixes for error messages and dialogs
Linux Kernel
v5.15.0–10134.14520 .04.1tux1
v6.8.0–111055.5722 .04.1tux1
v6.11.0–109019.1924 .04.1tux2
Each version is now based on the latest Ubuntu HWE version for Focal, Jammy, and Noble.
KDE App of the Week: Wallpaper Effects
If you want to enhance your KDE Plasma desktop with stylish effects, you should take a closer look at the Wallpaper Effects widget. Inspired by projects like Active Blur , this widget brings a variety of effects to all wallpaper plugins.
Features and Functions
With Wallpaper Effects, you can make numerous visual adjustments to your desktop background. The customizable blur effect allows for individual softening, including rounded corners, shadows, and color adjustments. Additionally, you can modify color and contrast settings such as brightness, saturation, and hue.
Another highlight is dynamic effect control: effects can be activated, for example, only for maximized windows or active applications. Integration with existing KDE desktop effects is also possible. For those who prefer shader effects, there are the Pixelate filter with adjustable pixel size or the animated Grain filter with variable intensity.
Wallpaper Effects in action: The widget brings customizable effects like blur, color filters, and shaders to the KDE Plasma desktop.
Installation
To install the widget on TUXEDO OS, right-click on an empty space on the desktop and select Enter Edit Mode from the context menu. In the editor mode, click Add or Manage Widgets… at the top left.
In the sidebar with the currently installed widgets, select Get New Modules… and then click Download New Widgets . This will open the KDE extension store, where you can search for „Wallpaper Effects“ and download the widget by clicking Install… .
Configuration
After installation, simply place the widget on your desktop. In the widget settings under Set up Wallpaper Effects… , you can adjust the desired effects. If you only want the widget to appear in edit mode, activate the Hide Widget option.
All adjustments are not permanent: If you want to undo changes, uncheck the Enabled option in the widget settings or remove the widget from the desktop.
How to install Wallpaper Effects: The widget can be easily integrated into KDE Plasma via the KDE Extension Store.
With Wallpaper Effects, KDE Plasma gains a powerful tool for personalizing your desktop. Thanks to the variety of options, effects can be precisely adjusted and toggled on or off – ideal for users who want to enhance their desktop without having to dive deep into the system.
TUXEDO OS Tips & Tricks: Keyboard Shortcuts for KDE Plasma
Keyboard shortcuts are essential for speeding up your workflow, and TUXEDO OS is no exception. Today, we’ll take a look at useful KDE Plasma keyboard combinations.
KDE Plasma offers numerous shortcuts for efficient navigation, and you can customize them in the system settings under Keyboard » Shortcuts .
Commonly Used Keyboard Shortcuts
Alt + F1 : Opens the main menu.
Alt + Space or Alt + F2 : Opens KRunner for search and command execution.
Alt + Tab : Switches between running programs.
Alt + Shift + Tab : Switches backward between programs.
While holding the Alt key, you can switch between windows using the Tab key.
You can customize these commands in the system settings under Window Management » Application Switcher .
Ctrl + Alt + L : Locks the screen.
Alt + F4 : Closes the active window.
Meta + Arrow keys : Moves windows to the right or left edge.
Ctrl + F12 : Shows the desktop.
Plasma supports virtual desktops, which you can add more of in the system settings under Window Management » Virtual Desktops :
Ctrl + F1 , F2 , etc.: Switch between desktops.
Meta + Q : Activates Plasma Activities.
Meta + P : Switches between external displays.
Here you can configure the application switcher.
Keyboard Shortcuts in Applications
The file manager Dolphin also supports useful keyboard combinations:
F4 : Opens a console at the bottom.
Ctrl + Shift + N : Creates a new folder.
Alt + . or Ctrl + H : Shows hidden files.
Learning these shortcuts will significantly boost your productivity. Once muscle memory has internalized the commands, you’ll be even more efficient while working with KDE Plasma!
Security Updates Ubuntu
The following security updates from Ubuntu are directly included in TUXEDO OS:
USN-7351–1: RESTEasy vulnerabilities : Several security issues have been fixed in RESTEasy.
Identifiers: CVE-2020–1695, CVE-2020–25633, CVE-2020–10688, and 3 others
Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7344–2: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifiers: CVE-2024–43893, CVE-2024–26685, CVE-2025–0927, and 36 others
Affected: Ubuntu 18.04 ESM, Ubuntu 16.04 ESM, Ubuntu 14.04 ESM
USN-7328–2: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifiers: CVE-2024–56672, CVE-2025–0927
Affected: Ubuntu 22.04 LTS
USN-7325–3: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifiers: CVE-2025–0927, CVE-2024–53104
Affected: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
USN-7332–3: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifiers: CVE-2024–43893, CVE-2024–26685, CVE-2024–41064, and 33 others
Affected: Ubuntu 14.04 ESM
USN-7343–2: Jinja2 regression : USN-7343–1 introduced a regression in Jinja2.
Affected: Ubuntu 20.04 LTS, Ubuntu 18.04 ESM
USN-7350–1: UnRAR vulnerabilities : Several security issues have been fixed in UnRAR.
Identifiers: CVE-2024–33899, CVE-2022–48579, CVE-2022–30333, and 1 other
Affected: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7349–1: RAR vulnerabilities : Several security issues have been fixed in RAR.
Identifiers: CVE-2022–30333, CVE-2023–40477
Affected: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7348–1: Python vulnerabilities : Several security issues have been fixed in Python.
Identifiers: CVE-2024–9287, CVE-2024–4032, CVE-2024–11168, and 1 other
Affected: Ubuntu 20.04 LTS, Ubuntu 16.04 ESM, Ubuntu 14.04 ESM
USN-7347–1: Netatalk vulnerabilities : Several security issues have been fixed in Netatalk.
Identifiers: CVE-2024–38441, CVE-2024–38439, CVE-2024–38440
Affected: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM, Ubuntu 14.04 ESM
USN-7346–1: OpenSC vulnerabilities : Several security issues have been fixed in OpenSC.
Identifiers: CVE-2021–42780, CVE-2024–45615, CVE-2023–40660, and 10 others
Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM
USN-7345–1: .NET vulnerability : .NET could be exploited to escalate privileges.
Identifier: CVE-2025–24070
Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
USN-7343–1: Jinja2 vulnerabilities : Several security issues have been fixed in Jinja2.
Identifiers: CVE-2025–27516, CVE-2024–56201, CVE-2024–56326
Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM, Ubuntu 14.04 ESM
USN-7332–2: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifiers: CVE-2024–41064, CVE-2024–36964, CVE-2024–42070, and 34 others
Affected: Ubuntu 16.04 ESM
USN-7344–1: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifiers: CVE-2024–41064, CVE-2024–36964, CVE-2024–42070, and 36 others
Affected: Ubuntu 18.04 ESM, Ubuntu 16.04 ESM
USN-7342–1: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifiers: CVE-2024–40981, CVE-2024–26685, CVE-2023–52522, and 35 others
Affected: Ubuntu 18.04 ESM, Ubuntu 16.04 ESM
USN-7341–1: FreeRDP vulnerabilities : Several security issues have been fixed in FreeRDP.
Identifiers: CVE-2024–32040, CVE-2024–32460, CVE-2024–32658, and 3 others
Affected: Ubuntu 24.04 LTS
USN-7340–1: OpenVPN vulnerabilities : Several security issues have been fixed in OpenVPN.
Identifiers: CVE-2024–5594, CVE-2017–12166
Affected: Ubuntu 18.04 ESM, Ubuntu 16.04 ESM, Ubuntu 14.04 ESM
USN-7338–1: CRaC JDK 17 vulnerabilities : Several security issues have been fixed in CRaC JDK 17.
Identifiers: CVE-2025–21502, CVE-2024–21217, CVE-2024–21208, and 2 others
Affected: Ubuntu 24.10
USN-7339–1: CRaC JDK 21 vulnerabilities : Several security issues have been fixed in CRaC JDK 21.
Identifiers: CVE-2024–21235, CVE-2024–21208, CVE-2024–21210, and 2 others
Affected: Ubuntu 24.10
USN-7337–1: LibreOffice vulnerability : LibreOffice could be exploited to execute programs when opening a specially crafted file.
Identifier: CVE-2025–1080
Affected: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7299–2: X.Org X Server vulnerabilities : Several security issues have been fixed in the X.Org X Server.
Identifiers: CVE-2025–26594, CVE-2025–26601, CVE-2025–26600, and 5 others
Affected: Ubuntu 18.04 ESM, Ubuntu 16.04 ESM
Current BIOS/EC Versions
An EC/BIOS update affects key system components. Please ensure that you follow the instructions carefully and take your time. The process is usually completed quickly. If you have any doubts, our support team is happy to assist you. The following devices have BIOS/EC updates available:
Model
CPU
GPU
BIOS
EC
Aura 15 - Gen2 / AURA1502
1.07.30RTR2
1.07.09
Gemini 15 - Gen1
1.07.12RTR5
1.07.05dTR2
Gemini 17 - Gen1
1.07.12RTR5
1.07.05dTR2
InfinityBook Pro 15 - Gen9
AMD
N.1.14A13
2.01.00
Stellaris Slim 15 - Gen6
AMD
GeForce RTX 4060
N.1.09A09
1.16.00
Stellaris Slim 15 - Gen6
AMD
GeForce RTX 4070
N.1.09A09
1.16.00