Hello TUXEDO Fans and Open-Source Enthusiasts!
Our developer penguins could hardly keep their flippers still last week – keyboards were on fire, code was flowing in streams, and the result is a bunch of improvements and new features for TUXEDO OS! New fixes for AMD and Intel graphics, more stable standby functions, and workarounds for boot issues ensure smooth operation of our TUXEDOs. But don’t worry, there were plenty of fish snacks in between to keep everyone energized.
Enjoy reading,
The TUXEDO OS Team
Note: We would like to keep you updated on the latest developments in TUXEDO OS with the TWIX series and introduce you to exciting applications as well as practical tips related to the KDE desktop and TUXEDO OS. However, this section should not be a one-way street: your feedback, ideas, and suggestions for improvement are very welcome! For this purpose, we have created a thread on Reddit, where you can reach us directly.
TUXEDO OS Updates
Tuxedo-tomte 2.48.0
The amdgpu-disable-psr module is now also installed on the TUXEDO Stellaris Slim AMD Gen6.
amdgpu-disable-psr : Disables Panel Self Refresh (PSR).
Transition of Existing Packages
tuxedo-fix-acpi-backlight-video 1.0.0
Workaround for boot delays and hangs in NVIDIA mode. Adds acpi_backlight=video
as a kernel parameter.
The previous Tomte fix has been moved to its own package, which writes the setting to /etc/default/grub.d
.
tuxedo-fix-amdgpu-disable-psr 1.0.0
Disables PSR and adds amdgpu.dcdebugmask=0x10
as a kernel parameter.
The previous Tomte fix has been moved to its own package, which writes the setting to /etc/default/grub.d
.
tuxedo-fix-disable-guc 1.0.0
Workaround for issues with GuC and HuC loading processes of the Intel iGPU driver (i915
). Adds i915.enable_guc=0
as a kernel parameter.
The previous Tomte fix has been moved to its own package, which writes the setting to /etc/default/grub.d
.
tuxedo-fix-no-ec-wakeup 1.0.0
Workaround for unexpected wake-ups from standby caused by the Embedded Controller (EC). Adds acpi.ec_no_wakeup=1
as a kernel parameter.
The previous Tomte fix has been moved to its own package, which writes the setting to /etc/default/grub.d
.
KDE App of the Week: Image Management with Gwenview
Today, we focus on Gwenview, a KDE application for managing images and videos. It now also offers basic image editing and annotation features.
The name might give the impression that it’s a GTK app – after all, it doesn’t start with a „K,“ which is often typical for KDE applications. In fact, developer Aurélien Gâteau originally started the project as a GTK application but switched to Qt early on, while the name remained. „Gwen“ means „white“ in Breton, so the name can be symbolically interpreted as a white canvas.
Part of KDE Since 2002
Gwenview was first released in 2002 with K Desktop Environment 3 and has now been fully ported to Plasma 6. In TUXEDO OS, Gwenview is pre-installed by default as part of Plasma 6.
The application supports numerous image formats, allows organization in albums, and can read EXIF data. For image editing, basic tools are available, including:
Rotate, flip, and crop
Resize
Red-eye correction
Adjust brightness, contrast, and gamma
Additionally, images can be annotated with elements such as arrows, shapes, text boxes, and stamps. Gwenview also offers common file operations like opening, copying, renaming, linking, and deleting.
Annotations can be added via the „Annotations“ sidebar.
The current version 24.12.3 is shipped with Plasma 6. If Gwenview isn’t pre-installed, it can be installed via the Discover package manager, the terminal, or as a Flatpak from Flathub.
Info: You can find more KDE apps that have been updated in the last week in the column This Week in KDE Apps
TUXEDO OS Tips & Tricks: Yakuake, the Drop-Down Terminal for KDE
If you regularly work with the command line, you know how important quick access to the terminal is. KDE already offers a powerful terminal program with Konsole, but Yakuake (Yet Another Kuake) takes it a step further: It’s a drop-down terminal that can be quickly toggled with a single key press – inspired by the classic Quake consoles.
Yakuake and KDE Konsole comparison: Yakuake can be toggled on and off with a press of F12.
Konsole vs. Yakuake
While Konsole runs like a classic terminal in its own window, Yakuake is always running in the background and appears as soon as you press the preset key F12 . This makes it perfect for users who frequently access the command line but don’t want the terminal constantly in the way. Other differences include:
Quick Access: Yakuake is immediately available without needing to open it manually.
Always Active in the Background: The terminal remains in memory and doesn’t reload every time.
Smooth Animations: Yakuake smoothly slides in and out, providing a seamless user experience.
Tabs and Splitting: Like Konsole, you can manage multiple sessions with tabs or split the screen.
Installation on TUXEDO OS
TUXEDO OS comes with the KDE environment by default, so Yakuake can be easily installed from the package repositories. You can install it using the software management tool Discover or open a terminal and enter the following command:
sudo apt install yakuake
Once installed, you can start Yakuake from the application menu or directly by pressing F12 . If the key doesn’t work, make sure Yakuake is running in the background.
Yakuake as an Alternative to Konsole
Yakuake in action on TUXEDO OS: Quickly toggling the terminal on and off with a key press.
Yakuake is a handy tool for anyone who frequently uses the terminal but doesn’t want a separate window open all the time. With a simple keystroke, you can bring it up anytime and just as easily hide it again – efficiency at its best!
Ubuntu Security Updates
The security updates listed here from Ubuntu are directly integrated into TUXEDO OS:
USN-7388–1: Linux kernel vulnerabilities : Multiple security issues were fixed in the Linux kernel.
Identifiers: CVE-2024–56724, CVE-2024–53125, CVE-2024–50230, and 353 others
Affects: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7387–1: Linux kernel vulnerabilities : Multiple security issues were fixed in the Linux kernel.
Identifiers: CVE-2024–53151, CVE-2024–50055, CVE-2024–53237, and 248 others
Affects: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7383–2: Linux kernel (Real-time) vulnerabilities : Multiple security issues were fixed in the Linux kernel.
Identifiers: CVE-2024–50055, CVE-2024–50200, CVE-2024–50065, and 105 others
Affects: Ubuntu 24.04 LTS
USN-7386–1: Linux kernel (OEM) vulnerabilities : Multiple security issues were fixed in the Linux kernel.
Identifiers: CVE-2024–49965, CVE-2024–50065, CVE-2024–49913, and 314 others
Affects: Ubuntu 24.04 LTS
USN-7385–1: Linux kernel (IBM) vulnerabilities : Multiple security issues were fixed in the Linux kernel.
Identifiers: CVE-2024–49965, CVE-2024–50065, CVE-2024–49913, and 314 others
Affects: Ubuntu 24.04 LTS
USN-7384–1: Linux kernel (Azure) vulnerabilities : Multiple security issues were fixed in the Linux kernel.
Identifiers: CVE-2024–49965, CVE-2024–50065, CVE-2024–49913, and 315 others
Affects: Ubuntu 24.04 LTS
USN-7377–1: Smarty vulnerability : Smarty could be made to crash or execute programs when opening a specially crafted file.
Identifier: CVE-2024–35226
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS
USN-7383–1: Linux kernel vulnerabilities : Multiple security issues were fixed in the Linux kernel.
Identifiers: CVE-2024–50040, CVE-2024–50096, CVE-2024–50057, and 105 others
Affects: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
USN-7382–1: Linux kernel (OEM) vulnerabilities : Multiple security issues were fixed in the Linux kernel.
Identifiers: CVE-2024–56582, CVE-2024–56608, CVE-2024–56714, and 304 others
Affects: Ubuntu 24.04 LTS
USN-7381–1: Linux kernel (Low Latency) vulnerabilities : Multiple security issues were fixed in the Linux kernel.
Identifiers: CVE-2024–56582, CVE-2024–56608, CVE-2024–56714, and 308 others
Affects: Ubuntu 24.04 LTS
USN-7380–1: Linux kernel (Low Latency) vulnerabilities : Multiple security issues were fixed in the Linux kernel.
Identifiers: CVE-2024–56582, CVE-2024–56608, CVE-2024–56714, and 307 others
Affects: Ubuntu 24.10
USN-7379–1: Linux kernel vulnerabilities : Multiple security issues were fixed in the Linux kernel.
Identifiers: CVE-2024–56582, CVE-2024–56608, CVE-2024–56714, and 305 others
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS
USN-7368–1: SnakeYAML vulnerability : SnakeYAML could be made to crash when processing specially crafted input.
Identifier: CVE-2017–18640
Affects: Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM, Ubuntu 14.04 ESM
USN-7378–1: Ghostscript vulnerabilities : Multiple security issues in Ghostscript were fixed.
Identifiers: CVE-2025–27830, CVE-2025–27835, CVE-2025–27832, and 4 others
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7376–1: MariaDB vulnerability : A security issue in MariaDB was fixed.
Identifier: CVE-2025–21490
Affects: Ubuntu 24.10
USN-7375–1: Org Mode vulnerabilities : Multiple security issues in Org Mode were fixed.
Identifiers: CVE-2023–28617, CVE-2024–30202, CVE-2024–39331, and 1 other
Affects: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM
USN-7374–1: containerd vulnerability : containerd could exhibit unexpected behavior.
Identifier: CVE-2024–40635
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM
USN-7373–1: Exim vulnerability : Exim could be made to crash or execute programs when receiving specially crafted network traffic.
Identifier: CVE-2025–30232
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS
USN-7372–1: Varnish vulnerability : Varnish could allow unintended access to network services.
Identifier: CVE-2022–45060
Affects: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM
Current BIOS/EC Versions
An EC/BIOS update affects key system components. Please ensure that you follow the instructions carefully and take your time. The process is usually completed quickly. If you have any doubts, our support team is happy to assist you. The following devices have BIOS/EC updates available:
Model
CPU
GPU
BIOS
EC
Aura 14 Gen3 (AU2)
1.07.12RTR
Aura 15 Gen3 (AU)
1.07.12RTR
1.07.04TR1