Hello TUXEDO Fans and Open-Source Enthusiasts!
While others on social media debate whether tariffs on imported fish sandwiches will drive prices up for the average consumer on their ice floe or whether a hotdog is a sandwich, our hardworking developer penguins prefer to focus on the code! As Linus Torvalds aptly puts it:
Because if we have issues in the kernel development model, then social media sure as hell isn’t the solution. The same way it sure as hell wasn’t the solution to politics. – Linus Torvalds
Instead of endless debates, we deliver tangible innovations: tuxedo-tomte now runs in virtual machines, the kernel has been updated, and KDE Connect makes life between smartphone and desktop easier. Dive into the latest developments around TUXEDO OS!
Enjoy reading,
The TUXEDO OS Team
Note: We would like to keep you updated on the latest developments in TUXEDO OS with the TWIX series and introduce you to exciting applications as well as practical tips related to the KDE desktop and TUXEDO OS. However, this section should not be a one-way street: your feedback, ideas, and suggestions for improvement are very welcome! For this purpose, we have created a thread on Reddit, where you can reach us directly.
Updates for TUXEDO OS
tuxedo-tomte 2.49.0
New: Tomte can now be installed on virtual machines.
Fix: Logging has been optimized to support automated testing.
linux v6.8.0–111057.5922 .04.1tux1
New: Jammy kernel update.
KDE App of the Week: Smartphone Pairing with KDE Connect
The open-source app KDE Connect is undoubtedly one of the flagship projects of the KDE community. It enables a secure and seamless connection between Android mobile devices and KDE desktops, as well as other devices.
The communication takes place exclusively via Multicast DNS in the local network, without transferring data to the cloud. Device pairing is initiated through a process similar to Bluetooth device pairing. The communication is always encrypted to ensure security and privacy.
What features does KDE Connect offer?
KDE Connect was originally developed by student Albert Vaka as part of the Google Summer of Code in 2013, and has since become an indispensable part of the KDE ecosystem. The app offers a variety of features that significantly simplify the exchange and control between devices. The key features of KDE Connect are:
File Transfer – Files can be easily transferred between smartphones and desktops, as well as between different smartphones and PCs.
Synchronization – Smartphone notifications are directly displayed on the desktop.
Clipboard Sharing – Clipboard contents can be exchanged between smartphone and desktop.
SMS and Calls – SMS messages can be read and replied to directly from the desktop. Calls can also be managed from the desktop.
Media Control – Media playback on the PC is automatically paused when a call comes in.
Device Search – The smartphone can be made to ring from the desktop. The phone’s battery status is also displayed directly on the desktop.
Browser Integration – Control content like YouTube or Netflix from the smartphone. Links can be directly sent to the smartphone to open them there. For this, a browser extension must be installed.
Remote Control – Use your smartphone as a touchpad or as a remote control for presentations.
Remote Access – Send commands to your PC, such as locking the screen or shutting down the PC. With OpenVPN support , this is even possible outside the local network.
Pairing and device settings can be managed directly in the KDE system settings, including notifications, file sharing, and remote control options.
Availability of KDE Connect
KDE Connect is available not only for Linux but also for Windows, macOS, and FreeBSD. A limited version is also offered for iOS. Additionally, KDE Connect has been implemented as GSConnect for the GNOME Shell. The developer of GSConnect, Andy Holmes, has further made the app accessible for other GTK-based desktops like Xfce under the name Valent .
On TUXEDO OS, KDE Connect comes pre-installed. If it isn’t available on your system yet, you can easily install it via the Discover Software Shop or by using the terminal with the command sudo apt update && sudo apt install kdeconnect . The Android app can be found in both the F-Droid repository and the Google Play Store .
Info: You can usually find more KDE apps that have been updated in the last week in the column This Week in KDE Apps . Due to the author’s well-deserved vacation, the next issue will not be published until April 20th.
TUXEDO OS Tips & Tricks: Finding Files and Searching Contents
Efficient file searching is one of the most important skills for any Linux user. Whether it’s tracking down a specific file in a directory tree or searching for text within files, the command line offers powerful tools for these tasks. However, graphical applications can also be helpful in this regard.
Searching for Files with KFind
Users of the KDE Plasma desktop environment, as found in TUXEDO OS, can use the KFind program for file searching. It provides a simple yet powerful interface for specifically searching for files and folders.
KFind offers a user-friendly interface for targeted file searches based on names, contents, or other criteria.
Searching for Files by Name
After launching KFind, you can enter a search term in the Name/Path tab and specify the directory to search in. This allows you to quickly find specific files without resorting to the command line.
Searching for Content Within Files
In the Content tab, KFind allows you to search for specific words or phrases within files—similar to grep in the command line. Regular expressions can also be used for more complex searches.
Using Advanced Filtering Options
Additionally, KFind allows you to narrow your search by date, file size, and other criteria, which is particularly useful when searching through many files in a large directory tree.
Searching for Files with find in the Terminal
The find command searches the file system recursively in the terminal for files and directories based on various criteria, such as name, size, or modification date. Below are some examples. The full syntax can be found, for example, in the man page, which can be accessed via man find .
Searching for Files by Name
This command searches the /home directory and all subdirectories for files (option -type f ) that end in .txt .
find /home -type f -name "*.txt"
Searching for Files Case-Insensitive
The option -iname ensures that case differences are ignored.
find /home -type f -iname "report.txt"
Searching for Files by Size
Here, all files in /var/log larger than 100 MB are searched for.
find /var/log -type f -size +100M
Searching for Files by Modification Date
Files modified within the last 7 days:
find /home -type f -mtime -7
Files modified more than 30 days ago:
find /home -type f -mtime +30
Automatically Deleting Found Files
With find , you can also apply actions directly to search results. The following command deletes all .log files in the /tmp directory that are older than 7 days.
find /tmp -type f -name "*.log" -mtime +7 -delete
Quickly Finding Files with locate
Unlike find , locate works with a pre-built database, which significantly speeds up searches.
Updating the Database
Since locate relies on an index database, it needs to be updated regularly:
sudo updatedb
Quickly Searching for Files
locate report.txt
This command instantly shows all paths where a file named report.txt is found.
Displaying Only Existing Files
If the locate database is outdated, it may show files that no longer exist. Use -e to list only actually existing files:
locate -e document.pdf
Showing Only Files from the Home Directory
Locate itself does not offer a way to filter the output and show only search results from specific directories. However, the output can be quickly filtered using grep :
locate example.txt | grep '^/home/'
Searching for Content Within Files
Sometimes, the filename is unknown, but the text contained in the file is known. This is where grep comes into play.
Simple Text Search
This command shows all lines in /var/log/syslog that contain the word „Error.“
grep "Error" /var/log/syslog
Recursive Search in Directories
With -r , the entire /var/log directory is searched for the term „error message.“
grep -r "error message" /var/log/
Case-Insensitive Search
The -i option ensures that „warning“, „Warning“, or „WARNING“ will be found.
grep -i "warning" /var/log/syslog
Displaying Line Numbers
This command shows the line number before each match.
grep -n "exception" error.log
Showing Only Filenames Containing the Search Term
This will only display the names of files containing „ERROR.“
grep -l "ERROR" *.log
With KFind, find , locate , and grep , TUXEDO OS offers powerful tools to quickly find files or search contents. While find is flexible and universally applicable, locate excels in speed. Grep perfectly complements these tools when it comes to finding text within files. With these tools, the workflow in the Linux console and KDE environment can be made efficient.
Ubuntu Security Updates
The security updates listed here from Ubuntu are directly integrated into TUXEDO OS:
USN-7415–1: Linux kernel vulnerabilities : Multiple security issues were fixed in the Linux kernel.
IDs: CVE-2021–47119, CVE-2021–47483, CVE-2021–47122, and 3 others
Affects: Ubuntu 14.04 ESM
USN-7414–1: XZ Utils vulnerability : XZ Utils could be made to crash or execute programs when opening a specially crafted file.
ID: CVE-2025–31115
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS
USN-7413–1: Linux kernel (IoT) vulnerabilities : Multiple security issues were fixed in the Linux kernel.
IDs: CVE-2024–50006, CVE-2024–50040, CVE-2024–36952, and 313 others
Affects: Ubuntu 20.04 LTS
USN-7406–4: Linux kernel (Azure FIPS) vulnerabilities : Multiple security issues were fixed in the Linux kernel.
IDs: CVE-2024–26928, CVE-2024–56658, CVE-2024–57798, and 1 other
Affects: Ubuntu 22.04 LTS
USN-7412–1: GnuPG vulnerability : GnuPG could be made to corrupt a keyring.
ID: CVE-2025–30258
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7411–1: OpenVPN vulnerability : OpenVPN could be made to crash when receiving specially crafted network traffic.
ID: CVE-2025–2704
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS
USN-7409–1: RubySAML vulnerabilities : Multiple security issues were fixed in RubySAML.
IDs: CVE-2025–25292, CVE-2025–25291, CVE-2025–25293
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM
USN-7408–2: Linux kernel (FIPS) vulnerabilities : Multiple security issues were fixed in the Linux kernel.
IDs: CVE-2024–26928, CVE-2024–56658, CVE-2024–35864
Affects: Ubuntu 20.04 LTS
USN-7408–1: Linux kernel vulnerabilities : Multiple security issues were fixed in the Linux kernel.
IDs: CVE-2024–56658, CVE-2024–35864, CVE-2024–26928
Affects: Ubuntu 20.04 LTS, Ubuntu 18.04 ESM
USN-7406–3: Linux kernel (Real-time) vulnerabilities : Multiple security issues were fixed in the Linux kernel.
IDs: CVE-2024–26928, CVE-2024–56658, CVE-2024–57798, and 1 other
Affects: Ubuntu 22.04 LTS
USN-7406–2: Linux kernel (FIPS) vulnerabilities : Multiple security issues were fixed in the Linux kernel.
IDs: CVE-2024–26928, CVE-2024–56658, CVE-2024–57798, and 1 other
Affects: Ubuntu 22.04 LTS
USN-7406–1: Linux kernel vulnerabilities : Multiple security issues were fixed in the Linux kernel.
IDs: CVE-2024–56658, CVE-2024–35864, CVE-2024–26928, and 1 other
Affects: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7407–1: Linux kernel (HWE) vulnerabilities : Multiple security issues were fixed in the Linux kernel.
IDs: CVE-2024–53685, CVE-2024–53237, CVE-2024–57917, and 252 others
Affects: Ubuntu 20.04 LTS
USN-7405–1: InspIRCd vulnerabilities : Multiple security issues were fixed in InspIRCd.
IDs: CVE-2020–25269, CVE-2016–7142, CVE-2019–20917
Affects: Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM
USN-7404–1: phpseclib vulnerabilities : Multiple security issues were fixed in phpseclib.
IDs: CVE-2024–27354, CVE-2024–27355, CVE-2023–52892, and 1 other
Affects: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM
USN-7403–1: Linux kernel (HWE) vulnerabilities : Multiple security issues were fixed in the Linux kernel.
IDs: CVE-2024–49888, CVE-2024–50233, CVE-2024–50009, and 322 others
Affects: Ubuntu 22.04 LTS
USN-7402–2: Linux kernel (Real-time) vulnerabilities : Multiple security issues were fixed in the Linux kernel.
IDs: CVE-2024–53140, CVE-2024–53063, CVE-2024–50302, and 5 others
Affects: Ubuntu 24.04 LTS
USN-7402–1: Linux kernel vulnerabilities : Multiple security issues were fixed in the Linux kernel.
IDs: CVE-2024–53140, CVE-2024–56598, CVE-2024–53063, and 5 others
Affects: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
USN-7401–1: Linux kernel (AWS) vulnerabilities : Multiple security issues were fixed in the Linux kernel.
IDs: CVE-2024–53183, CVE-2024–56659, CVE-2024–50195, and 292 others
Affects: Ubuntu 18.04 ESM
USN-7392–4: Linux kernel (AWS FIPS) vulnerabilities : Multiple security issues were fixed in the Linux kernel.
IDs: CVE-2024–53183, CVE-2024–56659, CVE-2024–56596, and 151 others
Affects: Ubuntu 20.04 LTS
USN-7392–3: Linux kernel (AWS) vulnerabilities : Multiple security issues were fixed in the Linux kernel.
IDs: CVE-2024–53183, CVE-2024–56659, CVE-2024–56596, and 151 others
Affects: Ubuntu 20.04 LTS
USN-7384–2: Linux kernel (Azure) vulnerabilities : Multiple security issues were fixed in the Linux kernel.
IDs: CVE-2024–49888, CVE-2024–50233, CVE-2024–50009, and 315 others
Affects: Ubuntu 22.04 LTS
USN-7261–2: Vim vulnerability : Vim could be made to crash.
ID: CVE-2025–24014
Affects: Ubuntu 24.04 LTS
USN-7379–2: Linux kernel (Raspberry Pi) vulnerabilities : Multiple security issues were fixed in the Linux kernel.
IDs: CVE-2024–56761, CVE-2024–56589, CVE-2024–56670, and 305 others
Affects: Ubuntu 24.10
USN-7285–2: nginx vulnerability : nginx could be made to bypass client certificate authentication requirements.
ID: CVE-2025–23419
Affects: Ubuntu 24.04 LTS
USN-7400–1: PHP vulnerabilities : Multiple security issues were fixed in PHP.
IDs: CVE-2025–1734, CVE-2025–1219, CVE-2025–1736, and 3 others
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7399–1: RabbitMQ Server vulnerability : The RabbitMQ Server management interface could be made to execute code via cross-site scripting (XSS).
ID: CVE-2025–30219
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7398–1: libtar vulnerabilities : Multiple security issues were fixed in libtar.
IDs: CVE-2021–33644, CVE-2021–33646, CVE-2021–33645, and 1 other
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM
USN-7397–1: AOM vulnerability : AOM could be made to crash or execute programs when opening a specially crafted file.
ID: CVE-2024–5171
Affects: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7396–1: OVN vulnerability : OVN could allow unintended network access.
ID: CVE-2025–0650
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7395–1: WebKitGTK vulnerabilities : Multiple security issues were fixed in WebKitGTK.
IDs: CVE-2025–24201, CVE-2024–44192, CVE-2024–54467
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
USN-7376–2: MariaDB vulnerability : A security issue in MariaDB was fixed.
ID: CVE-2025–21490
Affects: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
USN-7394–1: Doorkeeper vulnerabilities : Multiple security issues were fixed in ruby-doorkeeper.
IDs: CVE-2016–6582, CVE-2018–1000088
Affects: Ubuntu 16.04 ESM
Current BIOS/EC Versions
An EC/BIOS update affects key system components. Please ensure that you follow the instructions carefully and take your time. The process is usually completed quickly. If you have any doubts, our support team is happy to assist you. The following devices have BIOS/EC updates available:
Model
CPU
GPU
BIOS
EC
Aura 14 Gen3 (AU2)
1.07.12RTR
Aura 15 Gen3 (AU)
1.07.12RTR
1.07.04TR1