Hello TUXEDO Fans and Open-Source Enthusiasts!
This week was a short one – too short for serious coding. Our developer penguins were quite busy: instead of working with keyboards and terminals, they grabbed shovels and followed their noses to find all the Easter eggs before the snow arrived. Still, they managed to take a look at the Haruna Media Player – a sleek KDE app that combines MPV power with convenience. Plus, there’s a handy tip for GNOME users: how to make the FnLock status visible.
Enjoy reading,
The TUXEDO OS Team
Note: We would like to keep you updated on the latest developments in TUXEDO OS with the TWIX series and introduce you to exciting applications as well as practical tips related to the KDE desktop and TUXEDO OS. However, this section should not be a one-way street: your feedback, ideas, and suggestions for improvement are very welcome! For this purpose, we have created a thread on Reddit, where you can reach us directly.
KDE App of the Week: Haruna Media Player
In our KDE App of the Week series, we’re once again focusing on media players. Today, we’d like to introduce you to Haruna – a modern and versatile video player that also handles audio files with ease. Haruna is developed using Qt/QML and libmpv , a library that enables the integration of the powerful command-line player MPV as a backend for media playback.
Haruna is especially aimed at users who want a user-friendly interface packed with features, without having to compromise on the performance and flexibility that MPV provides. The app integrates seamlessly with the Plasma desktop of TUXEDO OS and fits in visually particularly well.
Versatile Features for Local and Online Content
Haruna offers an impressive range of features: it plays both local media files and content from YouTube and other online platforms. The configuration options are just as diverse.
Haruna’s settings offer numerous options for playback, interface, and controls
Thanks to hardware acceleration support, the GPU can contribute to smooth playback. Many functions can be efficiently controlled using keyboard shortcuts or mouse gestures – for example, jumping to the next chapter with a middle-click on the progress bar. A picture-in-picture mode, customizable subtitles, and video bookmarks further enhance the user experience.
The interface is clean and easy to use with either mouse or keyboard
Easy Installation on TUXEDO OS
Haruna is available in the official repositories of many Linux distributions – including TUXEDO OS, of course. You can easily install it via the Plasma software manager Discover, either as a Debian package or Flatpak. Just select your preferred format in the top right corner of the package window. Alternatively, the application can also be built directly from source – in true free software spirit.
Info: You can find more KDE apps that have been updated in the last week in the column This Week in KDE Apps
TUXEDO Tips & Tricks: Displaying FnLock Status in GNOME
The Linux desktop world is diverse – and that’s exactly what makes it so exciting. While many users of our TUXEDO systems rely on KDE Plasma – not least because it comes pre-installed with TUXEDO OS and offers extensive customization options – GNOME also enjoys great popularity. GNOME follows a different philosophy: instead of maximizing customizability, it aims to “just work” out of the box – with clear structures, a minimalist interface, and a well-thought-out user experience.
Making FnLock Visible in GNOME
Many TUXEDO devices – especially laptops – offer a feature called FnLock. This controls whether the function keys (F1 to F12) perform their special functions by default (e.g., volume control, brightness, keyboard backlight) or behave as classic F1–F12 keys. Unfortunately, GNOME does not display the current FnLock status by default.
This is where the TUXEDO FnLock status extension comes in. It adds a small icon to the GNOME top menu that shows the current status of the FnLock function. This way, you always know at a glance whether the special functions are active – without having to test them manually.
The TUXEDO FnLock status extension displays the current state of the FnLock key in GNOME – so you can instantly tell whether the special functions or classic F-keys are active.
Important to note: The extension is based on a fork of the version originally developed for ThinkPad keyboards. It is not officially developed or supported by TUXEDO Computers, but it works very well with TUXEDO hardware – provided the tuxedo-drivers are installed in version 4.0.0 or newer. The extension can be installed starting from GNOME 46 up to the current GNOME 48.
Ubuntu Security Updates
The security updates listed here from Ubuntu are directly integrated into TUXEDO OS:
USN-7463–1: Linux kernel (IBM) vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–53237, CVE-2024–56633, CVE-2024–35958, and 164 others
Affected: Ubuntu 18.04 ESM
USN-7462–2: Linux kernel (AWS FIPS) vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–53237, CVE-2021–47119, CVE-2024–56651, and 11 others
Affected: Ubuntu 20.04 LTS
USN-7462–1: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–26928, CVE-2024–26915, CVE-2025–21700, and 11 others
Affected: Ubuntu 20.04 LTS, Ubuntu 18.04 ESM
USN-7461–2: Linux kernel (FIPS) vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–26915, CVE-2025–21700, CVE-2024–53237, and 8 others
Affected: Ubuntu 20.04 LTS
USN-7461–1: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–53237, CVE-2021–47119, CVE-2024–56651, and 8 others
Affected: Ubuntu 20.04 LTS, Ubuntu 18.04 ESM
USN-7460–1: Linux kernel (Azure FIPS) vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2025–21703, CVE-2025–21700, CVE-2024–50256, and 10 others
Affected: Ubuntu 22.04 LTS
USN-7459–1: Linux kernel (Intel IoTG) vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–56631, CVE-2024–26837, CVE-2024–53150, and 264 others
Affected: Ubuntu 20.04 LTS
USN-7458–1: Linux kernel (IBM) vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–40965, CVE-2024–56708, CVE-2024–50074, and 355 others
Affected: Ubuntu 20.04 LTS
USN-7457–1: OpenSSH vulnerability : OpenSSH could allow unintended access to network services.
Identifier: CVE-2025–32728
Affected: Ubuntu 25.04, Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7456–1: Twig vulnerabilities : Several security issues have been fixed in Twig.
Identifier: CVE-2024–45411, CVE-2024–51754
Affected: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7455–3: Linux kernel (Real-time) vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2025–21703, CVE-2025–21700, CVE-2024–50256, and 9 others
Affected: Ubuntu 22.04 LTS
USN-7455–2: Linux kernel (FIPS) vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–26837, CVE-2024–56651, CVE-2025–21993, and 9 others
Affected: Ubuntu 22.04 LTS
USN-7455–1: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2025–21703, CVE-2025–21700, CVE-2024–50256, and 9 others
Affected: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7454–1: libarchive vulnerabilities : Several security issues have been fixed in libarchive.
Identifier: CVE-2025–25724, CVE-2025–1632
Affected: Ubuntu 25.04, Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7453–1: Linux kernel (Real-time) vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–53047, CVE-2024–50270, CVE-2024–56724, and 458 others
Affected: Ubuntu 24.04 LTS
USN-7452–1: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–53047, CVE-2024–50270, CVE-2024–56724, and 457 others
Affected: Ubuntu 22.04 LTS
USN-7451–1: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–53083, CVE-2024–53134, CVE-2024–41932, and 574 others
Affected: Ubuntu 22.04 LTS
USN-7450–1: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–53047, CVE-2024–50270, CVE-2024–56724, and 457 others
Affected: Ubuntu 24.04 LTS
USN-7449–1: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–53047, CVE-2024–50270, CVE-2024–56724, and 458 others
Affected: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
USN-7446–1: mod_auth_openidc vulnerability : mod_auth_openidc could expose sensitive information over the network.
Identifier: CVE-2025–31492
Affected: Ubuntu 25.04, Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
USN-7448–1: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2025–21695, CVE-2025–21673, CVE-2025–21685, and 38 others
Affected: Ubuntu 24.10, Ubuntu 24.04 LTS
USN-7447–1: Yelp vulnerability : Yelp could expose sensitive information over the network.
Identifier: CVE-2025–3155
Affected: Ubuntu 25.04, Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-7445–1: Linux kernel vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2025–21695, CVE-2025–21673, CVE-2025–21685, and 37 others
Affected: Ubuntu 24.10, Ubuntu 24.04 LTS
USN-7434–2: Perl vulnerability : Perl could crash or execute programs when processing specially crafted data.
Identifier: CVE-2024–56406
Affected: Ubuntu 25.04
USN-7431–2: HAProxy vulnerability : HAProxy could crash or execute programs when receiving specially crafted network traffic.
Identifier: CVE-2025–32464
Affected: Ubuntu 25.04
USN-7443–2: Erlang vulnerability : Erlang could execute programs when receiving specially crafted network traffic.
Identifier: CVE-2025–32433
Affected: Ubuntu 25.04
USN-7402–5: Linux kernel (GCP) vulnerabilities : Several security issues have been fixed in the Linux kernel.
Identifier: CVE-2024–53140, CVE-2024–56598, CVE-2024–53063, and 5 others
Affected: Ubuntu 22.04 LTS
USN-7444–1: Synapse vulnerabilities : Several security issues have been fixed in Synapse.
Identifier: CVE-2023–41335, CVE-2023–32683, CVE-2023–43796, and 5 others
Affected: Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 ESM