This Week in TUXEDO OS #15-2025 - TUXEDO Computers

  ATTENTION: To use our store you have to activate JavaScript and deactivate script blockers!  
Thank you for your understanding!

This Week in TUXEDO OS #15-2025

Hello TUXEDO Fans and Open-Source Enthusiasts!

Freshly back from the „Make Antarctica Cool Again“ demo, our developer penguins are already enthusiastically diving back into the code! This week, TUXEDO OS brings a kernel update for Ubuntu Focal and, for the first time, support for Elementary OS 8. Our KDE App of the Week is the minimalist Dragon Player – perfect for those who prefer watching videos without any frills. And in this week’s tip, we show how to find the largest space hogs on your hard drives – both graphically on the KDE Plasma interface and in the terminal.

Enjoy reading,
The TUXEDO OS Team

Note: We would like to keep you updated on the latest developments in TUXEDO OS with the TWIX series and introduce you to exciting applications as well as practical tips related to the KDE desktop and TUXEDO OS. However, this section should not be a one-way street: your feedback, ideas, and suggestions for improvement are very welcome! For this purpose, we have created a thread on Reddit, where you can reach us directly.

TUXEDO OS Updates

tuxedo-tomte 2.50.0

  • New: Added support for Elementary OS 8.

linux v5.15.0–10136.14720.04.1tux1

  • New: Added kernel update for Ubuntu Focal.

KDE App of the Week: Simplicity as a Concept – Dragon Player

Diversity in Audio Players

Under KDE Plasma, there’s no shortage of audio and video players. In this series, we’ve already introduced the classic Amarok for audio and the current KDE standard player, Elisa. But there are more interesting applications we’d like to highlight in due course. Today, the focus is on Dragon Player.

Audio and Video

Dragon Player is a multimedia player capable of playing both audio and video files, with a clear emphasis on video. The main concept: simplicity over feature overload. The user interface is intentionally minimalist, offering only the essential functions:

  • Continue watching videos: Resumes playback from where it was last stopped
  • Automatic subtitles: Loads available subtitles automatically
  • Image adjustment: Options to adjust brightness and contrast
  • CD and DVD playback: Supports optical media
  • Backend-independent: Thanks to Solid and Phonon, Dragon Player is not tied to any specific multimedia framework or hardware interface

The player consciously forgoes advanced features such as playlist management or metadata display in favor of a streamlined and user-friendly experience.

Supported Formats

Dragon Player supports all media formats recognized by the chosen Phonon backend. Phonon is a multimedia interface that can use various backends like GStreamer, VLC, or MPV.

With Plasma 6, the Phonon-MPV backend is used by default – GStreamer is no longer supported in this context. This allows Dragon Player to play a wide range of common formats:

  • Video formats: MKV, MP4, AVI, MOV
  • Audio formats: MP3, AAC, FLAC, Ogg Vorbis, and many more

Dragon Player is not pre-installed in TUXEDO OS but can be easily installed via the Discover package manager – just search for Dragon Player. For those who prefer the console, the package can be installed with:

sudo apt install dragonplayer

Info: You can find more KDE apps that were updated last week in the column This Week in KDE Apps.

TUXEDO OS Tips & Tricks: Finding Disk Space Hogs

Although hard drives with terabyte capacities are now available at a reasonable price, it’s always wise to manage disk space efficiently. Especially when space is running low, it’s important to know exactly which data is taking up the most space. TUXEDO OS offers two useful tools that allow you to quickly and easily identify the largest space hogs on your hard drive: Filelight for a graphical representation and gdu for the command line.

Filelight: Graphical Visualization of Disk Usage

Filelight is a graphical tool that visualizes disk usage in a circular representation. Each segment of the circle represents a folder or file, and the size of each segment corresponds to the amount of disk space it occupies. This visualization makes it easy to spot large folders and files at a glance.

Installing Filelight on TUXEDO OS

You can install Filelight via the Discover software management tool or through the command line. To do so, open a terminal and execute the following command:

sudo apt install filelight
Using Filelight

After installation, you can launch Filelight from the application menu. Once opened, select the drive or directory you want to examine. Disk usage will then be displayed as a circular visualization, giving you a quick overview of how space is distributed.

By clicking on the different segments of the visualization, you can get detailed information about the respective folders and their sizes. This way, you can specifically search for large files or folders that consume a lot of space. If you find large files or folders that you no longer need, you can delete them directly via the file manager or move them to an external hard drive.

gdu: Quickly and Efficiently Analyze Disk Usage

In the past, ncdu (NCurses Disk Usage) was often used to analyze disk usage via the command line. However, ncdu has the drawback of being written in C, which can make it relatively slow, especially with large directories. A modern alternative that works much faster is gdu (Go Disk Usage), developed in Go, which offers a significant speed advantage.

Installing gdu on TUXEDO OS

The program is not part of the standard TUXEDO OS installation, but you can easily install it via the command line. Enter the following command:

sudo apt install gdu
Using gdu

After installation, you can start gdu directly from the terminal. To do so, enter gdu followed by the path to the desired directory. Example:

gdu /home

gdu analyzes the specified directory and provides an overview of the largest files and folders. The largest file or folder is displayed first, making it easier to identify space hogs. By entering a question mark, you can access detailed help that explains the most important keyboard shortcuts and functions.

With gdu, you can delete files or folders directly without needing a graphical user interface. This makes it especially useful for working in a headless environment or on servers. Similar to TUXEDO OS, the program can also be installed from the package manager on most other distributions.

Ubuntu Security Updates

The security updates listed here from Ubuntu are directly integrated into TUXEDO OS:

  • USN-7432–1: libsoup vulnerabilities: Multiple security issues were fixed in libsoup.
    Identifier: CVE-2025–32050, CVE-2025–2784, CVE-2025–32052, and 2 others
    Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS

  • USN-7431–1: HAProxy vulnerability: HAProxy could be crashed or made to execute programs if it received specially crafted network traffic.
    Identifier: CVE-2025–32464
    Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS

  • USN-7430–1: Dino vulnerability: Dino could be tricked into disclosing sensitive information over the network.
    Identifier: CVE-2023–28686
    Affects: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS

  • USN-7346–3: OpenSC vulnerabilities: USN-7346–1 introduced a regression in OpenSC.
    Identifier: CVE-2021–42780, CVE-2024–45615, CVE-2023–40660, and 8 others
    Affects: Ubuntu 20.04 LTS

  • USN-7426–2: poppler vulnerabilities: Poppler could be crashed when opening a specially crafted PDF file.
    Identifier: CVE-2025–32365, CVE-2025–32364
    Affects: Ubuntu 18.04 ESM, Ubuntu 16.04 ESM

  • USN-7429–2: Linux kernel (FIPS) vulnerabilities: Multiple security issues were fixed in the Linux kernel.
    Identifier: CVE-2024–50302, CVE-2024–49948, CVE-2024–56595, and 18 others
    Affects: Ubuntu 16.04 ESM

  • USN-7429–1: Linux kernel vulnerabilities: Multiple security issues were fixed in the Linux kernel.
    Identifier: CVE-2024–50302, CVE-2024–49948, CVE-2024–56595, and 18 others
    Affects: Ubuntu 16.04 ESM, Ubuntu 14.04 ESM

  • USN-7428–2: Linux kernel (FIPS) vulnerabilities: Multiple security issues were fixed in the Linux kernel.
    Identifier: CVE-2021–47101, CVE-2022–23041, CVE-2024–50302, and 17 others
    Affects: Ubuntu 18.04 ESM

  • USN-7428–1: Linux kernel vulnerabilities: Multiple security issues were fixed in the Linux kernel.
    Identifier: CVE-2021–47119, CVE-2024–35973, CVE-2024–50302, and 17 others
    Affects: Ubuntu 18.04 ESM, Ubuntu 16.04 ESM, Ubuntu 14.04 ESM

  • USN-7426–1: poppler vulnerabilities: Poppler could be crashed when opening a specially crafted PDF file.
    Identifier: CVE-2025–32365, CVE-2025–32364
    Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS

  • USN-7425–1: Erlang vulnerability: Erlang could be made to consume large amounts of memory.
    Identifier: CVE-2025–30211
    Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS

  • USN-7424–1: Expat vulnerability: Expat could be crashed if it received specially crafted input.
    Identifier: CVE-2024–8176
    Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS

  • USN-7423–1: GNU binutils vulnerabilities: Multiple security issues were fixed in GNU binutils.
    Identifier: CVE-2025–1182, CVE-2025–1176, CVE-2025–1153, and 2 others
    Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS

  • USN-7406–6: Linux kernel (NVIDIA Tegra IGX) vulnerabilities: Multiple security issues were fixed in the Linux kernel.
    Identifier: CVE-2024–57798, CVE-2024–26928, CVE-2024–56658, and 1 other
    Affects: Ubuntu 22.04 LTS

  • USN-7402–4: Linux kernel vulnerabilities: Multiple security issues were fixed in the Linux kernel.
    Identifier: CVE-2024–57798, CVE-2024–56672, CVE-2024–50302, and 5 others
    Affects: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS

  • USN-7408–4: Linux kernel (HWE) vulnerabilities: Multiple security issues were fixed in the Linux kernel.
    Identifier: CVE-2024–26928, CVE-2024–56658, CVE-2024–35864
    Affects: Ubuntu 18.04 ESM

  • USN-7408–3: Linux kernel (FIPS) vulnerabilities: Multiple security issues were fixed in the Linux kernel.
    Identifier: CVE-2024–26928, CVE-2024–56658, CVE-2024–35864
    Affects: Ubuntu 20.04 LTS

  • USN-7422–1: FIS-GT.M vulnerabilities: Multiple security issues were fixed in FIS-GT.M.
    Identifier: CVE-2021–44502, CVE-2021–44510, CVE-2021–44506, and 5 others
    Affects: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM

  • USN-7421–1: Linux kernel (Azure) vulnerabilities: Multiple security issues were fixed in the Linux kernel.
    Identifier: CVE-2024–57906, CVE-2024–43098, CVE-2024–53120, and 253 others
    Affects: Ubuntu 20.04 LTS

  • USN-7420–1: Linux kernel (Azure) vulnerabilities: Multiple security issues were fixed in the Linux kernel.
    Identifier: CVE-2024–57798, CVE-2024–26928, CVE-2024–42069, and 2 others
    Affects: Ubuntu 22.04 LTS

  • USN-7406–5: Linux kernel (NVIDIA) vulnerabilities: Multiple security issues were fixed in the Linux kernel.
    Identifier: CVE-2024–57798, CVE-2024–26928, CVE-2024–56658, and 1 other
    Affects: Ubuntu 22.04 LTS

  • USN-7418–1: Ruby vulnerabilities: Multiple security issues were fixed in Ruby.
    Identifier: CVE-2024–35176, CVE-2024–43398, CVE-2025–27219, and 5 others
    Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS

  • USN-7419–1: Vim vulnerabilities: Vim could be made to crash if it received specially crafted input. IDs: CVE-2025–26603, CVE-2025–1215 Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM, Ubuntu 14.04 ESM

  • USN-7410–1: Tomcat vulnerability: Tomcat could be made to consume resources if it received specially crafted network traffic. ID: CVE-2023–44487 Affects: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM

  • USN-6885–4: Apache HTTP Server regression: USN-6885–1 introduced a regression in the Apache HTTP Server. ID: – Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM

  • USN-7417–1: libdbd-mysql-perl vulnerabilities: Multiple security issues were fixed in libdbd-mysql-perl. IDs: CVE-2016–1251, CVE-2016–1249, CVE-2017–10789, and 1 other Affects: Ubuntu 14.04 ESM

  • USN-7416–1: Kamailio vulnerabilities: Multiple security issues were fixed in Kamailio. IDs: CVE-2020–28361, CVE-2016–2385, CVE-2018–14767 Affects: Ubuntu 20.04 LTS, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM