This Week in TUXEDO OS #13-2025 - TUXEDO Computers

  ATTENTION: To use our store you have to activate JavaScript and deactivate script blockers!  
Thank you for your understanding!

This Week in TUXEDO OS #13-2025

Hello TUXEDO Fans and Open-Source Enthusiasts!

Our developer penguins could hardly keep their flippers still last week – keyboards were on fire, code was flowing in streams, and the result is a bunch of improvements and new features for TUXEDO OS! New fixes for AMD and Intel graphics, more stable standby functions, and workarounds for boot issues ensure smooth operation of our TUXEDOs. But don’t worry, there were plenty of fish snacks in between to keep everyone energized.

Enjoy reading,
The TUXEDO OS Team

Note: We would like to keep you updated on the latest developments in TUXEDO OS with the TWIX series and introduce you to exciting applications as well as practical tips related to the KDE desktop and TUXEDO OS. However, this section should not be a one-way street: your feedback, ideas, and suggestions for improvement are very welcome! For this purpose, we have created a thread on Reddit, where you can reach us directly.

TUXEDO OS Updates

Tuxedo-tomte 2.48.0

  • The amdgpu-disable-psr module is now also installed on the TUXEDO Stellaris Slim AMD Gen6.
  • amdgpu-disable-psr: Disables Panel Self Refresh (PSR).

Transition of Existing Packages

tuxedo-fix-acpi-backlight-video 1.0.0
  • Workaround for boot delays and hangs in NVIDIA mode. Adds acpi_backlight=video as a kernel parameter.
  • The previous Tomte fix has been moved to its own package, which writes the setting to /etc/default/grub.d.
tuxedo-fix-amdgpu-disable-psr 1.0.0
  • Disables PSR and adds amdgpu.dcdebugmask=0x10 as a kernel parameter.
  • The previous Tomte fix has been moved to its own package, which writes the setting to /etc/default/grub.d.
tuxedo-fix-disable-guc 1.0.0
  • Workaround for issues with GuC and HuC loading processes of the Intel iGPU driver (i915). Adds i915.enable_guc=0 as a kernel parameter.
  • The previous Tomte fix has been moved to its own package, which writes the setting to /etc/default/grub.d.
tuxedo-fix-no-ec-wakeup 1.0.0
  • Workaround for unexpected wake-ups from standby caused by the Embedded Controller (EC). Adds acpi.ec_no_wakeup=1 as a kernel parameter.
  • The previous Tomte fix has been moved to its own package, which writes the setting to /etc/default/grub.d.

KDE App of the Week: Image Management with Gwenview

Today, we focus on Gwenview, a KDE application for managing images and videos. It now also offers basic image editing and annotation features.

The name might give the impression that it’s a GTK app – after all, it doesn’t start with a „K,“ which is often typical for KDE applications. In fact, developer Aurélien Gâteau originally started the project as a GTK application but switched to Qt early on, while the name remained. „Gwen“ means „white“ in Breton, so the name can be symbolically interpreted as a white canvas.

Part of KDE Since 2002

Gwenview was first released in 2002 with K Desktop Environment 3 and has now been fully ported to Plasma 6. In TUXEDO OS, Gwenview is pre-installed by default as part of Plasma 6.

The application supports numerous image formats, allows organization in albums, and can read EXIF data. For image editing, basic tools are available, including:

  • Rotate, flip, and crop
  • Resize
  • Red-eye correction
  • Adjust brightness, contrast, and gamma

Additionally, images can be annotated with elements such as arrows, shapes, text boxes, and stamps. Gwenview also offers common file operations like opening, copying, renaming, linking, and deleting.

The current version 24.12.3 is shipped with Plasma 6. If Gwenview isn’t pre-installed, it can be installed via the Discover package manager, the terminal, or as a Flatpak from Flathub.

Info: You can find more KDE apps that have been updated in the last week in the column This Week in KDE Apps

TUXEDO OS Tips & Tricks: Yakuake, the Drop-Down Terminal for KDE

If you regularly work with the command line, you know how important quick access to the terminal is. KDE already offers a powerful terminal program with Konsole, but Yakuake (Yet Another Kuake) takes it a step further: It’s a drop-down terminal that can be quickly toggled with a single key press – inspired by the classic Quake consoles.

Konsole vs. Yakuake

While Konsole runs like a classic terminal in its own window, Yakuake is always running in the background and appears as soon as you press the preset key F12. This makes it perfect for users who frequently access the command line but don’t want the terminal constantly in the way. Other differences include:

  • Quick Access: Yakuake is immediately available without needing to open it manually.
  • Always Active in the Background: The terminal remains in memory and doesn’t reload every time.
  • Smooth Animations: Yakuake smoothly slides in and out, providing a seamless user experience.
  • Tabs and Splitting: Like Konsole, you can manage multiple sessions with tabs or split the screen.

Installation on TUXEDO OS

TUXEDO OS comes with the KDE environment by default, so Yakuake can be easily installed from the package repositories. You can install it using the software management tool Discover or open a terminal and enter the following command:

sudo apt install yakuake

Once installed, you can start Yakuake from the application menu or directly by pressing F12. If the key doesn’t work, make sure Yakuake is running in the background.

Yakuake as an Alternative to Konsole

Yakuake is a handy tool for anyone who frequently uses the terminal but doesn’t want a separate window open all the time. With a simple keystroke, you can bring it up anytime and just as easily hide it again – efficiency at its best!

Ubuntu Security Updates

The security updates listed here from Ubuntu are directly integrated into TUXEDO OS:

  • USN-7388–1: Linux kernel vulnerabilities: Multiple security issues were fixed in the Linux kernel.
    Identifiers: CVE-2024–56724, CVE-2024–53125, CVE-2024–50230, and 353 others
    Affects: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS

  • USN-7387–1: Linux kernel vulnerabilities: Multiple security issues were fixed in the Linux kernel.
    Identifiers: CVE-2024–53151, CVE-2024–50055, CVE-2024–53237, and 248 others
    Affects: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS

  • USN-7383–2: Linux kernel (Real-time) vulnerabilities: Multiple security issues were fixed in the Linux kernel.
    Identifiers: CVE-2024–50055, CVE-2024–50200, CVE-2024–50065, and 105 others
    Affects: Ubuntu 24.04 LTS

  • USN-7386–1: Linux kernel (OEM) vulnerabilities: Multiple security issues were fixed in the Linux kernel.
    Identifiers: CVE-2024–49965, CVE-2024–50065, CVE-2024–49913, and 314 others
    Affects: Ubuntu 24.04 LTS

  • USN-7385–1: Linux kernel (IBM) vulnerabilities: Multiple security issues were fixed in the Linux kernel.
    Identifiers: CVE-2024–49965, CVE-2024–50065, CVE-2024–49913, and 314 others
    Affects: Ubuntu 24.04 LTS

  • USN-7384–1: Linux kernel (Azure) vulnerabilities: Multiple security issues were fixed in the Linux kernel.
    Identifiers: CVE-2024–49965, CVE-2024–50065, CVE-2024–49913, and 315 others
    Affects: Ubuntu 24.04 LTS

  • USN-7377–1: Smarty vulnerability: Smarty could be made to crash or execute programs when opening a specially crafted file.
    Identifier: CVE-2024–35226
    Affects: Ubuntu 24.10, Ubuntu 24.04 LTS

  • USN-7383–1: Linux kernel vulnerabilities: Multiple security issues were fixed in the Linux kernel.
    Identifiers: CVE-2024–50040, CVE-2024–50096, CVE-2024–50057, and 105 others
    Affects: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS

  • USN-7382–1: Linux kernel (OEM) vulnerabilities: Multiple security issues were fixed in the Linux kernel.
    Identifiers: CVE-2024–56582, CVE-2024–56608, CVE-2024–56714, and 304 others
    Affects: Ubuntu 24.04 LTS

  • USN-7381–1: Linux kernel (Low Latency) vulnerabilities: Multiple security issues were fixed in the Linux kernel.
    Identifiers: CVE-2024–56582, CVE-2024–56608, CVE-2024–56714, and 308 others
    Affects: Ubuntu 24.04 LTS

  • USN-7380–1: Linux kernel (Low Latency) vulnerabilities: Multiple security issues were fixed in the Linux kernel.
    Identifiers: CVE-2024–56582, CVE-2024–56608, CVE-2024–56714, and 307 others
    Affects: Ubuntu 24.10

  • USN-7379–1: Linux kernel vulnerabilities: Multiple security issues were fixed in the Linux kernel.
    Identifiers: CVE-2024–56582, CVE-2024–56608, CVE-2024–56714, and 305 others
    Affects: Ubuntu 24.10, Ubuntu 24.04 LTS

  • USN-7368–1: SnakeYAML vulnerability: SnakeYAML could be made to crash when processing specially crafted input.
    Identifier: CVE-2017–18640
    Affects: Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM, Ubuntu 14.04 ESM

  • USN-7378–1: Ghostscript vulnerabilities: Multiple security issues in Ghostscript were fixed.
    Identifiers: CVE-2025–27830, CVE-2025–27835, CVE-2025–27832, and 4 others
    Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS

  • USN-7376–1: MariaDB vulnerability: A security issue in MariaDB was fixed.
    Identifier: CVE-2025–21490
    Affects: Ubuntu 24.10

  • USN-7375–1: Org Mode vulnerabilities: Multiple security issues in Org Mode were fixed.
    Identifiers: CVE-2023–28617, CVE-2024–30202, CVE-2024–39331, and 1 other
    Affects: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM

  • USN-7374–1: containerd vulnerability: containerd could exhibit unexpected behavior.
    Identifier: CVE-2024–40635
    Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM

  • USN-7373–1: Exim vulnerability: Exim could be made to crash or execute programs when receiving specially crafted network traffic.
    Identifier: CVE-2025–30232
    Affects: Ubuntu 24.10, Ubuntu 24.04 LTS

  • USN-7372–1: Varnish vulnerability: Varnish could allow unintended access to network services.
    Identifier: CVE-2022–45060
    Affects: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM

Current BIOS/EC Versions

An EC/BIOS update affects key system components. Please ensure that you follow the instructions carefully and take your time. The process is usually completed quickly. If you have any doubts, our support team is happy to assist you. The following devices have BIOS/EC updates available:

Model CPU GPU BIOS EC
Aura 14 Gen3 (AU2)     1.07.12RTR  
Aura 15 Gen3 (AU)     1.07.12RTR 1.07.04TR1