Hello TUXEDO Fans and Open-Source Enthusiasts!
The developer penguins in the Augsburg TUXEDO colony are always delighted when in-depth tests and well-founded analyses about Linux appear on YouTube. This time, Gamers Nexus took a closer look at the Bazzite distribution and examined how well the system handles modern Nvidia and AMD hardware. The results offer fascinating insights into the current state of Linux as a gaming platform. For TUXEDO gamers in particular, the findings on framerate, frame times, and shader performance are highly valuable. In this weeks TWIX, we take a look at the KDE Partition Manager and ReImage, a handy image-editing extension built right into the Dolphin file manager.
Enjoy reading,
The TUXEDO OS Team
Note: We would like to keep you updated on the latest developments in TUXEDO OS with the TWIX series and introduce you to exciting applications as well as practical tips related to the KDE desktop and TUXEDO OS. However, this section should not be a one-way street: your feedback, ideas, and suggestions for improvement are very welcome! For this purpose, we have created a thread on Reddit, where you can reach us directly.
Updates in TUXEDO OS
TUXEDO OS ISO
Updated: Plasma 6.5.2
Updated: Qt 6.9.2
Updated: Frameworks 6.19.0
Updated: KDE Gear 25.08.2 (excluding Akonadi/PIM and Kamoso)
New: Depending on the installed hardware, the ISO now uses either nvidia or nvidia-open.
Improved: Systems with Nvidia hardware that is no longer supported by the mainline driver should now boot normally. In these cases, the ISO removes all Nvidia packages and automatically switches to nouveau.
Updated: With the latest Tomte release, Nvidia 580 is now the default driver. The ISO already includes it, so no manual replacement is required after installation.
Includes all TUXEDO OS–specific updates up to 24 November 2025.
Also included: Firefox 145.0.2.
Further details on Plasma 6.5.2: https://www.tuxedocomputers.com/en/Update-to-Plasma-6–5–2-is-available.tuxedo
tuxedo-drivers 4.18.1
Fixed: Keyboard backlight support for the InfinityBook Pro Gen10 (Intel).
TUXEDO Control Center 2.1.21
tuxedo-tomte 2.58.0
New: Meta packages tuxedo-nvidia-default and tuxedo-nvidia-default-open for Nvidia drivers.
KeePassXC 2.7.11
Note: Due to a critical bug , we are temporarily holding back the update to KeePassXC 2.7.11 (changelog ).
KDE App of the Week: The Heart of the Matter, the KDE Partition Manager
In this edition of the KDE App of the Week, we take a close look at what the KDE Partition Manager (KPM) brings to the table. Many long-time Linux users are likely familiar with the GTK-based tool GParted for managing partitions. However, the KDE Partition Manager has offered a capable, fully graphical alternative since 2009.
Supported File Systems
KPM is a versatile tool for managing disks, partitions and file systems on Linux. It lets you create, copy, move, delete as well as grow and shrink partitions (without data loss), and supports a wide range of file systems, including Ext2, Ext3, Ext4, Btrfs, NTFS, FAT16, FAT32, JFS, XFS and the now-obsolete ReiserFS.
It also offers limited support for HFS on older macOS systems, though modern macOS file systems like APFS cannot be handled. In addition, KPM provides support for LUKS-encrypted partitions, aligning well with today’s security requirements.
KDE Partition Manager provides a clean, structured interface. Pending operations are executed only after clicking Apply.
Resizing
Some file systems – such as Btrfs or NTFS – allow online resizing, meaning the partition can remain mounted while being enlarged or shrunk. However, for safety reasons, it is generally advisable to perform such operations from a live system, where no partitions are mounted.
For LUKS-encrypted partitions, resizing is possible while they are unmounted, provided the encrypted device has been closed beforehand using cryptsetup . In all cases, the rule of thumb remains: always create a backup before modifying partition sizes.
User Interface and Operation
After scanning your disks, KPM displays a complete overview of all storage devices and their partitions, including size and used space. All available actions can be conveniently performed via the context menu.
Additional panels and optional detail views provide flexible insight into your storage layout. You can display information fields showing the file system, size, label or active flags of each partition.
Partition Manager supports the most important file systems. Its feature set largely matches that of GParted.
Technical Background and Development
KDE Partition Manager was originally written in C++ using the Qt toolkit for the KDE platform and is released under the GPL. The project was founded by Volker Lanz in 2009 and has been continuously improved ever since. It is not tied to KDE’s regular release cycle, allowing new features, file-system support and security improvements to arrive more quickly.
Its core logic lives in the kpmcore library, which handles all essential storage-management tasks. KPM supports both MBR (Master Boot Record) and the more modern GPT (GUID Partition Table), which is designed for larger disks and allows more than four primary partitions.
GParted vs. KDE Partition Manager
Both graphical tools offer similar features and support comparable file systems. GParted is often the first point of contact, mainly because it is widely available on live systems. KPM, on the other hand, integrates seamlessly into KDE environments, leverages frameworks like KAuth for privilege handling and fits naturally into KDE’s menus and launchers. The switch to sfdisk in 2022 as a backend (a tool that does not require root privileges) also brought improved Wayland compatibility and a more modern security architecture.
Under TUXEDO OS, KDE Partition Manager comes preinstalled. You can find it through the main menu by searching for Partition Manager . On the command line, start the application using partitionmanager . The same name applies when installing the tool on a live ISO – for example, when you prefer it over GParted.
Info: Are you interested in Plasma development and want to know what new features are planned and which programs have been recently updated? You can find a detailed overview in the weekly column This week in Plasma by KDE developer Nate Graham.
TUXEDO OS Tips & Tricks: Image Editing with ReImage in Dolphin
Images play a bigger role in daily computer use than many realize — whether as screenshots, photos, or scanned documents. They often need to be converted into another format, such as from PNG to WebP, to save storage space or speed up downloads from your website. You may want to scale an image to a specific size, adjust its quality, rotate a whole batch by 90 degrees, or remove sensitive EXIF metadata.
Image Editing for Dolphin
For these kinds of tasks, you don’t necessarily need a full-fledged graphics editor. It’s often far more convenient to handle them directly within the file manager. This is exactly where the KDE 6 Service Menu ReImage comes in. The extension integrates seamlessly into the KDE file manager Dolphin and adds new context menu entries as soon as you select one or several images.
To install it, take a look at the project’s GitHub repository . There you can clone the source code onto your system. The following commands install the necessary dependencies on TUXEDO OS, download the project, and set up the extension system-wide. Using the installation script, you can also remove ReImage later.
Installation
sudo apt install qt6-tools-dev exiftool git
git clone https://github.com/irfanhakim-as/kde-service-menu-reimage.git ~/.kde-service-menu-reimage
cd ~/.kde-service-menu-reimage
Uninstallation
sudo qtpaths_bin=/usr/bin/qtpaths6 ./install.sh
After installation, a right-click on a single image or a whole selection is enough. Under Actions , you will now find a new entry that allows you to convert formats, scale images, or apply simple edits such as rotating, flipping, grayscale, or sepia. Progress messages keep you informed throughout the process.
You can scale, compress, and adjust single images or entire batches to reduce file size and achieve optimal quality for the web or archiving.
ReImage lets you quickly convert images into other formats or save them rotated and flipped so they’re immediately ready for their intended purpose.
The extension makes it easy to remove EXIF metadata from images or automatically add new information to maintain privacy and keep collections well organized.
ReImage also offers simple editing features such as converting to grayscale or sepia and adding drop shadows for a more polished appearance.
Workaround
At the moment, each run of ReImage opens a small window with the message „Initializing…“ that does not close automatically. Until this bug is fixed, you can apply a small workaround. Open the file reimage-kdialog in /usr/bin with administrative privileges and comment out the four lines shown below by placing a hash mark at the beginning of each line. The window will no longer appear afterward.
Editor
sudo nano /usr/bin/reimage-kdialog
Save the changes with Ctrl +X , confirm with Y , and press Enter .
Before
quantity=$#
dbus_ref=$("${kdialog_bin}" [...] $quantity)
qdbus $dbus_ref showCancelButton true
processed=0
After
# quantity=$#
# dbus_ref=$("${kdialog_bin}" [...] $quantity)
# qdbus $dbus_ref showCancelButton true
# processed=0
Ubuntu Security Updates
The security updates listed here from Ubuntu are directly integrated into TUXEDO OS:
USN-7898–1: OpenVPN vulnerability : OpenVPN could allow unintended access to network services.
IDs: CVE-2025–13086
Affects: Ubuntu 25.10, 25.04, 24.04 LTS
USN-7897–1: CUPS vulnerability : CUPS could be made to crash or run programs as an administrator if it opened a specially crafted file.
IDs: CVE-2025–61915
Affects: Ubuntu 25.10, 25.04, 24.04 LTS, 22.04 LTS, 20.04 LTS, 18.04 LTS, 16.04 LTS
USN-7895–1: WebKitGTK vulnerabilities : Several security issues were fixed in WebKitGTK.
IDs: CVE-2025–43343
Affects: Ubuntu 25.10, 25.04, 24.04 LTS, 22.04 LTS
USN-7894–1: EDK II vulnerabilities : Several security issues were fixed in EDK II.
IDs: CVE-2023–45236, CVE-2024–2511, CVE-2024–38805 + 27 others
Affects: Ubuntu 25.04, 24.04 LTS, 22.04 LTS
USN-7893–1: Valkey vulnerabilities : Several security issues were fixed in Valkey.
IDs: CVE-2025–46818, CVE-2025–49112, CVE-2025–49844 + 2 others
Affects: Ubuntu 25.10, 25.04, 24.04 LTS
USN-7891–1: rust-openssl vulnerabilities : Several security issues were fixed in rust-openssl.
IDs: CVE-2023–53159, CVE-2025–24898, CVE-2025–3416
Affects: Ubuntu 24.04 LTS, 22.04 LTS, 20.04 LTS
USN-7889–3: Linux kernel (Real-time) vulnerabilities : Several security issues were fixed in the Linux kernel.
IDs: CVE-2025–38227, CVE-2025–38678, CVE-2025–21729 + 1 other
Affects: Ubuntu 24.04 LTS, 22.04 LTS
USN-7889–2: Linux kernel (FIPS) vulnerabilities : Several security issues were fixed in the Linux kernel.
IDs: CVE-2025–38227, CVE-2025–38678, CVE-2025–21729 + 1 other
Affects: Ubuntu 24.04 LTS
USN-7879–3: Linux kernel vulnerabilities : Several security issues were fixed in the Linux kernel.
IDs: CVE-2025–38566, CVE-2025–38448, CVE-2025–38625 + 197 others
Affects: Ubuntu 24.04 LTS
USN-7889–1: Linux kernel vulnerabilities : Several security issues were fixed in the Linux kernel.
IDs: CVE-2025–38616, CVE-2025–38678, CVE-2025–21729 + 1 other
Affects: Ubuntu 24.04 LTS, 22.04 LTS
USN-7887–2: Linux kernel (Raspberry Pi) vulnerabilities : Several security issues were fixed in the Linux kernel.
IDs: CVE-2025–38152, CVE-2025–22086, CVE-2025–22021 + 57 others
Affects: Ubuntu 24.04 LTS
USN-7888–1: MuPDF vulnerabilities : Several security issues were fixed in MuPDF.
IDs: CVE-2023–51106, CVE-2023–51104, CVE-2025–46206 + 3 others
Affects: Ubuntu 25.04, 24.04 LTS, 22.04 LTS, 20.04 LTS, 18.04 LTS
USN-7887–1: Linux kernel (Raspberry Pi Real-time) vulnerabilities : Several security issues were fixed in the Linux kernel.
IDs: CVE-2025–38152, CVE-2025–22086, CVE-2025–22021 + 57 others
Affects: Ubuntu 24.04 LTS
USN-7886–1: Python vulnerabilities : Several security issues were fixed in Python.
IDs: CVE-2025–6075, CVE-2025–8291
Affects: Ubuntu 24.04 LTS, 22.04 LTS, 20.04 LTS, 18.04 LTS, 16.04 LTS, 14.04 LTS
USN-7885–1: OpenJDK 21 vulnerabilities : Several security issues were fixed in OpenJDK 21.
IDs: CVE-2025–53057, CVE-2025–61748, CVE-2025–53066
Affects: Ubuntu 25.10, 25.04, 24.04 LTS, 22.04 LTS, 20.04 LTS
USN-7884–1: OpenJDK 25 vulnerabilities : Several security issues were fixed in OpenJDK 25.
IDs: CVE-2025–53057, CVE-2025–61748, CVE-2025–53066
Affects: Ubuntu 25.10, 25.04, 24.04 LTS, 22.04 LTS
USN-7851–2: runC regression : USN-7851–1 introduced a regression in runC.
IDs: —
Affects: Ubuntu 25.10, 25.04, 24.04 LTS, 22.04 LTS
USN-7883–1: OpenJDK 17 vulnerabilities : Several security issues were fixed in OpenJDK 17.
IDs: CVE-2025–53057, CVE-2025–53066
Affects: Ubuntu 25.10, 25.04, 24.04 LTS, 22.04 LTS, 20.04 LTS, 18.04 LTS
USN-7882–1: OpenJDK 11 vulnerabilities : Several security issues were fixed in OpenJDK 11.
IDs: CVE-2025–53057, CVE-2025–53066
Affects: Ubuntu 25.10, 25.04, 24.04 LTS, 22.04 LTS, 20.04 LTS, 18.04 LTS
USN-7881–1: OpenJDK 8 vulnerabilities : Several security issues were fixed in OpenJDK 8.
IDs: CVE-2025–53057, CVE-2025–53066
Affects: Ubuntu 25.10, 25.04, 24.04 LTS, 22.04 LTS, 20.04 LTS, 18.04 LTS, 16.04 LTS