Hello TUXEDO Fans and Open-Source Enthusiasts!
Freshly back from the „Make Antarctica Cool Again“ demo, our developer penguins are already enthusiastically diving back into the code! This week, TUXEDO OS brings a kernel update for Ubuntu Focal and, for the first time, support for Elementary OS 8. Our KDE App of the Week is the minimalist Dragon Player – perfect for those who prefer watching videos without any frills. And in this week’s tip, we show how to find the largest space hogs on your hard drives – both graphically on the KDE Plasma interface and in the terminal.
Enjoy reading,
The TUXEDO OS Team
Note: We would like to keep you updated on the latest developments in TUXEDO OS with the TWIX series and introduce you to exciting applications as well as practical tips related to the KDE desktop and TUXEDO OS. However, this section should not be a one-way street: your feedback, ideas, and suggestions for improvement are very welcome! For this purpose, we have created a thread on Reddit, where you can reach us directly.
TUXEDO OS Updates
tuxedo-tomte 2.50.0
New: Added support for Elementary OS 8.
linux v5.15.0–10136.14720 .04.1tux1
New: Added kernel update for Ubuntu Focal.
KDE App of the Week: Simplicity as a Concept – Dragon Player
Diversity in Audio Players
Under KDE Plasma, there’s no shortage of audio and video players. In this series, we’ve already introduced the classic Amarok for audio and the current KDE standard player, Elisa. But there are more interesting applications we’d like to highlight in due course. Today, the focus is on Dragon Player .
Audio and Video
Dragon Player is a multimedia player capable of playing both audio and video files, with a clear emphasis on video. The main concept: simplicity over feature overload. The user interface is intentionally minimalist, offering only the essential functions:
Continue watching videos: Resumes playback from where it was last stopped
Automatic subtitles: Loads available subtitles automatically
Image adjustment: Options to adjust brightness and contrast
CD and DVD playback: Supports optical media
Backend-independent: Thanks to Solid and Phonon, Dragon Player is not tied to any specific multimedia framework or hardware interface
Dragon Player focuses on a minimalist interface with few but well-thought-out features for simple media playback.
The player consciously forgoes advanced features such as playlist management or metadata display in favor of a streamlined and user-friendly experience.
Supported Formats
Dragon Player supports all media formats recognized by the chosen Phonon backend. Phonon is a multimedia interface that can use various backends like GStreamer, VLC, or MPV.
With Plasma 6, the Phonon-MPV backend is used by default – GStreamer is no longer supported in this context. This allows Dragon Player to play a wide range of common formats:
Video formats: MKV, MP4, AVI, MOV
Audio formats: MP3, AAC, FLAC, Ogg Vorbis, and many more
Dragon Player is not pre-installed in TUXEDO OS but can be easily installed via the Discover package manager – just search for Dragon Player . For those who prefer the console, the package can be installed with:
sudo apt install dragonplayer
TUXEDO OS Tips & Tricks: Finding Disk Space Hogs
Although hard drives with terabyte capacities are now available at a reasonable price, it’s always wise to manage disk space efficiently. Especially when space is running low, it’s important to know exactly which data is taking up the most space. TUXEDO OS offers two useful tools that allow you to quickly and easily identify the largest space hogs on your hard drive: Filelight for a graphical representation and gdu for the command line.
Filelight: Graphical Visualization of Disk Usage
Filelight is a graphical tool that visualizes disk usage in a circular representation. Each segment of the circle represents a folder or file, and the size of each segment corresponds to the amount of disk space it occupies. This visualization makes it easy to spot large folders and files at a glance.
Installing Filelight on TUXEDO OS
You can install Filelight via the Discover software management tool or through the command line. To do so, open a terminal and execute the following command:
sudo apt install filelight
Using Filelight
After installation, you can launch Filelight from the application menu. Once opened, select the drive or directory you want to examine. Disk usage will then be displayed as a circular visualization, giving you a quick overview of how space is distributed.
The graphical visualization in Filelight shows you how the space is distributed on your hard drive, making it easier to identify space hogs.
By clicking on the different segments of the visualization, you can get detailed information about the respective folders and their sizes. This way, you can specifically search for large files or folders that consume a lot of space. If you find large files or folders that you no longer need, you can delete them directly via the file manager or move them to an external hard drive.
gdu: Quickly and Efficiently Analyze Disk Usage
In the past, ncdu (NCurses Disk Usage) was often used to analyze disk usage via the command line. However, ncdu has the drawback of being written in C, which can make it relatively slow, especially with large directories. A modern alternative that works much faster is gdu (Go Disk Usage), developed in Go, which offers a significant speed advantage.
Installing gdu on TUXEDO OS
The program is not part of the standard TUXEDO OS installation, but you can easily install it via the command line. Enter the following command:
sudo apt install gdu
Using gdu
After installation, you can start gdu directly from the terminal. To do so, enter gdu followed by the path to the desired directory. Example:
gdu /home
gdu analyzes the specified directory and provides an overview of the largest files and folders. The largest file or folder is displayed first, making it easier to identify space hogs. By entering a question mark, you can access detailed help that explains the most important keyboard shortcuts and functions.
The overview in gdu shows you the largest files and folders consuming the most disk space directly in the terminal.
With gdu, you can delete files or folders directly without needing a graphical user interface. This makes it especially useful for working in a headless environment or on servers. Similar to TUXEDO OS, the program can also be installed from the package manager on most other distributions.
Ubuntu Security Updates
The security updates listed here from Ubuntu are directly integrated into TUXEDO OS:
USN-7432–1: libsoup vulnerabilities : Multiple security issues were fixed in libsoup.
Identifier: CVE-2025–32050, CVE-2025–2784, CVE-2025–32052, and 2 others
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7431–1: HAProxy vulnerability : HAProxy could be crashed or made to execute programs if it received specially crafted network traffic.
Identifier: CVE-2025–32464
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
USN-7430–1: Dino vulnerability : Dino could be tricked into disclosing sensitive information over the network.
Identifier: CVE-2023–28686
Affects: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7346–3: OpenSC vulnerabilities : USN-7346–1 introduced a regression in OpenSC.
Identifier: CVE-2021–42780, CVE-2024–45615, CVE-2023–40660, and 8 others
Affects: Ubuntu 20.04 LTS
USN-7426–2: poppler vulnerabilities : Poppler could be crashed when opening a specially crafted PDF file.
Identifier: CVE-2025–32365, CVE-2025–32364
Affects: Ubuntu 18.04 ESM, Ubuntu 16.04 ESM
USN-7429–2: Linux kernel (FIPS) vulnerabilities : Multiple security issues were fixed in the Linux kernel.
Identifier: CVE-2024–50302, CVE-2024–49948, CVE-2024–56595, and 18 others
Affects: Ubuntu 16.04 ESM
USN-7429–1: Linux kernel vulnerabilities : Multiple security issues were fixed in the Linux kernel.
Identifier: CVE-2024–50302, CVE-2024–49948, CVE-2024–56595, and 18 others
Affects: Ubuntu 16.04 ESM, Ubuntu 14.04 ESM
USN-7428–2: Linux kernel (FIPS) vulnerabilities : Multiple security issues were fixed in the Linux kernel.
Identifier: CVE-2021–47101, CVE-2022–23041, CVE-2024–50302, and 17 others
Affects: Ubuntu 18.04 ESM
USN-7428–1: Linux kernel vulnerabilities : Multiple security issues were fixed in the Linux kernel.
Identifier: CVE-2021–47119, CVE-2024–35973, CVE-2024–50302, and 17 others
Affects: Ubuntu 18.04 ESM, Ubuntu 16.04 ESM, Ubuntu 14.04 ESM
USN-7426–1: poppler vulnerabilities : Poppler could be crashed when opening a specially crafted PDF file.
Identifier: CVE-2025–32365, CVE-2025–32364
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7425–1: Erlang vulnerability : Erlang could be made to consume large amounts of memory.
Identifier: CVE-2025–30211
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7424–1: Expat vulnerability : Expat could be crashed if it received specially crafted input.
Identifier: CVE-2024–8176
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
USN-7423–1: GNU binutils vulnerabilities : Multiple security issues were fixed in GNU binutils.
Identifier: CVE-2025–1182, CVE-2025–1176, CVE-2025–1153, and 2 others
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7406–6: Linux kernel (NVIDIA Tegra IGX) vulnerabilities : Multiple security issues were fixed in the Linux kernel.
Identifier: CVE-2024–57798, CVE-2024–26928, CVE-2024–56658, and 1 other
Affects: Ubuntu 22.04 LTS
USN-7402–4: Linux kernel vulnerabilities : Multiple security issues were fixed in the Linux kernel.
Identifier: CVE-2024–57798, CVE-2024–56672, CVE-2024–50302, and 5 others
Affects: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
USN-7408–4: Linux kernel (HWE) vulnerabilities : Multiple security issues were fixed in the Linux kernel.
Identifier: CVE-2024–26928, CVE-2024–56658, CVE-2024–35864
Affects: Ubuntu 18.04 ESM
USN-7408–3: Linux kernel (FIPS) vulnerabilities : Multiple security issues were fixed in the Linux kernel.
Identifier: CVE-2024–26928, CVE-2024–56658, CVE-2024–35864
Affects: Ubuntu 20.04 LTS
USN-7422–1: FIS-GT.M vulnerabilities : Multiple security issues were fixed in FIS-GT.M.
Identifier: CVE-2021–44502, CVE-2021–44510, CVE-2021–44506, and 5 others
Affects: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM
USN-7421–1: Linux kernel (Azure) vulnerabilities : Multiple security issues were fixed in the Linux kernel.
Identifier: CVE-2024–57906, CVE-2024–43098, CVE-2024–53120, and 253 others
Affects: Ubuntu 20.04 LTS
USN-7420–1: Linux kernel (Azure) vulnerabilities : Multiple security issues were fixed in the Linux kernel.
Identifier: CVE-2024–57798, CVE-2024–26928, CVE-2024–42069, and 2 others
Affects: Ubuntu 22.04 LTS
USN-7406–5: Linux kernel (NVIDIA) vulnerabilities : Multiple security issues were fixed in the Linux kernel.
Identifier: CVE-2024–57798, CVE-2024–26928, CVE-2024–56658, and 1 other
Affects: Ubuntu 22.04 LTS
USN-7418–1: Ruby vulnerabilities : Multiple security issues were fixed in Ruby.
Identifier: CVE-2024–35176, CVE-2024–43398, CVE-2025–27219, and 5 others
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7419–1: Vim vulnerabilities : Vim could be made to crash if it received specially crafted input. IDs: CVE-2025–26603, CVE-2025–1215 Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM, Ubuntu 14.04 ESM
USN-7410–1: Tomcat vulnerability : Tomcat could be made to consume resources if it received specially crafted network traffic. ID: CVE-2023–44487 Affects: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM
USN-6885–4: Apache HTTP Server regression : USN-6885–1 introduced a regression in the Apache HTTP Server. ID: – Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM
USN-7417–1: libdbd-mysql-perl vulnerabilities : Multiple security issues were fixed in libdbd-mysql-perl. IDs: CVE-2016–1251, CVE-2016–1249, CVE-2017–10789, and 1 other Affects: Ubuntu 14.04 ESM
USN-7416–1: Kamailio vulnerabilities : Multiple security issues were fixed in Kamailio. IDs: CVE-2020–28361, CVE-2016–2385, CVE-2018–14767 Affects: Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM