Hello TUXEDO Fans and Open-Source Enthusiasts!
And the Oscar goes to… Open Source! Free software is no longer just a cornerstone of the IT world. Creative professionals in the film and music industries also rely on open tools and Linux, from DAWs (Digital Audio Workstations) like Ardour , Zrythm , and Qtractor to commercial solutions such as Reaper and Bitwig Studio , all of which run on Linux.
Blender has established itself as a true industry standard. The free 3D software is indispensable in the animation scene and has even won an Oscar. After films like I Lost My Body and Wolfwalkers , which used Blender in their production, were only nominated in 2020 and 2021, in 2025 Flow (JustWatch ) became the first film fully produced with Blender to win the Oscar for Best Animated Feature. Blender also contributed this year. In The Girl Who Cried Pearls (accessible for free within the US and Canada), while the puppets were animated by hand in stop-motion, Blender handled the characters’ facial expressions.
Our recap of This Week in TUXEDO OS may not be quite Oscar-worthy – but it’s exciting nonetheless: This time, we take a look at the new Marknote 1.5, the practical KDE-based note-taking tool that fully embraces Markdown. We also show you how to easily integrate AppImages into your system with a single click. As always, we summarize the most important updates in TUXEDO OS.
Enjoy reading,
The TUXEDO OS Team
Note: We would like to keep you updated on the latest developments in TUXEDO OS with the TWIX series and introduce you to exciting applications as well as practical tips related to the KDE desktop and TUXEDO OS. However, this section should not be a one-way street: your feedback, ideas, and suggestions for improvement are very welcome! For this purpose, we have created a thread on Reddit, where you can reach us directly.
Updates in TUXEDO OS
WebFAI 6.0.5–2.3.2
Fixed „No Wi-Fi on Fedora 43 KDE“
Temporarily removed Fedora Crypt
CRYPT installation can now replace Windows/Dualboot
More information on the latest WebFAI updates
Firefox 148.0.2tux1
New upstream version Firefox 148.0.2
Set „DisableRemoteImprovements“ policy to „true“
All details on Firefox 148 and Firefox 148.0.2
Thunderbird 3:140.8.1esrtux2
Save dialog now uses KDE style instead of GNOME design
tuxedo-systeminfos 20260227.2.0
Added NB02 battery information (introduced with tuxedo-drivers 4.20.0)
tuxedo-reboot-into-grub 1.0.6
KDE App of the Week: Marknote – Notes in Markdown
In issue #02–2026 of TWIX, we already introduced the WYSIWYG note-taking app Marknote from the KDE project. Recently, Marknote 1.5 and shortly thereafter Marknote 1.5.1 were released with several exciting new features that we don’t want you to miss.
What’s New in Marknote 1.5?
Version 1.5 adds multiple features aimed specifically at users who prefer Markdown. A new source mode allows direct editing of the Markdown source, making the WYSIWYG editor optional. Internal wiki links have also been added, enabling notes to be linked across different notebooks. For faster access, a new KRunner plugin allows you to open and search notes directly from the Plasma desktop, without having to launch the application.
Note management has also been improved. Notes can now be moved between notebooks via drag-and-drop, the number of entries in each notebook is displayed, and templates can be duplicated. A global full-text search with replace makes working with larger note collections much easier. Additionally, table editing has been enhanced for better handling of structured content.
Marknote 1.5 allows moving notes between notebooks, shows the number of entries at a glance, and makes navigation faster with the new drag-and-drop feature
Installation via Flatpak
The new features show that Marknote is evolving from a simple WYSIWYG note app into a Markdown-based knowledge system with internal linking, fast navigation, and tight Plasma integration. This makes Marknote an interesting alternative to established proprietary tools such as Obsidian .
Marknote is not preinstalled on TUXEDO OS, but it is always available in the latest version as a Flatpak through the Discover software shop. A native Debian package is expected to follow at a later date. With such up-to-date software and active developers, it’s also worth keeping an eye on Flathub regularly.
Info: Are you interested in Plasma development and want to know what new features are planned and which programs have been recently updated? You can find a detailed overview in the weekly column This week in Plasma by KDE developer Nate Graham.
TUXEDO OS Tips & Tricks: Integrating AppImages into the Application Menu
On TUXEDO OS, there are essentially three ways to integrate applications into your system. In general, it is recommended to prefer the Discover package manager and fall back to Flathub when needed. Through Discover, you get classic Debian packages that integrate cleanly into the system and are updated automatically. Simply install applications like GIMP with a click – they will then be available system-wide.
The Discover package manager provides access to official Debian packages. Applications can be installed conveniently, are updated automatically, and are then available centrally to all users on the system.
Up-to-date applications via Flatpak
Flatpak allows developers to provide distribution-independent software packages via Flathub . This simplifies maintenance and ensures that applications are often available in very recent versions. Since Flatpaks bundle many dependencies, they require more storage space. On modern systems, this is usually negligible – in return, you benefit from very up-to-date software.
Flathub extends the available package sources with many up-to-date applications. These can be installed directly via Discover and often receive updates faster than traditional distribution packages.
AppImages, an alternative to Flatpak
AppImages are another way to use software on Linux – especially when applications are neither available in the package repositories nor as Flatpaks. Here as well, all required components are already included. No installation is necessary: you simply need to make the file executable and can then start the application with a double-click.
However, AppImages are less convenient in one regard: they do not automatically appear in the application menu. This is where the tool Gear Lever comes in handy, which you can easily install via Flathub . The project’s source code is available on GitHub . It originates from the GNOME software ecosystem but works perfectly fine with KDE Plasma as well.
„Installing“ AppImages with Gear Lever
With Gear Lever, you can integrate AppImages into your system almost like traditional applications. Launch the program and simply drag and drop the downloaded file into the window. Gear Lever reads the metadata and offers to add the application to your menu. By default, the file is moved to a central directory such as ~/AppImages .
Drag and drop the downloaded AppImage file into the Gear Lever window. The tool automatically detects the application and prepares it for integration into your system.
After integration, the application appears directly in the application menu and can be launched like any other installed program. In addition, Gear Lever notifies you about available updates and allows you to install them with a single click – without manually downloading the AppImage again.
After integration, the application is available directly in the application menu. You can launch it as usual without having to go through the file manager.
Gear Lever automatically checks AppImages for updates and notifies you about new versions. These can be downloaded and installed directly from within the application.
You can further customize the behavior in the settings, for example by changing the storage location for AppImages or configuring additional options. For instance, you can manually define environment variables or specify a different URL for updates.
In the Gear Lever settings, you can tailor the behavior to your needs, such as changing the AppImage storage location or configuring additional integration options for applications on your system.
Removing AppImages is just as straightforward: simply delete the application directly via Gear Lever. The associated user data usually remains intact and is stored – as usual – in directories such as ~/.config or ~/.cache as subfolders. If you want to remove all data, you will need to clean up these directories manually.
Ubuntu Security Updates
The security updates listed here from Ubuntu are directly integrated into TUXEDO OS:
USN-8105–2: FreeRDP regression : USN-8105–1 introduced a regression in FreeRDP.
Affects: Ubuntu 25.10, Ubuntu 24.04 LTS
USN-8111–1: OpenStack Glance vulnerability : OpenStack Glance konnte für Server-Side Request Forgery missbraucht werden.
Affects: Ubuntu 25.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
USN-8103–2: Exiv2 regression : USN-8103–1 introduced a regression in Exiv2.
IDs: CVE-2025–55304
Affects: Ubuntu 25.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-8110–1: Net-CIDR vulnerability : Net-CIDR konnte unbeabsichtigten Zugriff auf Netzwerkdienste erlauben.
IDs: CVE-2021–4456
Affects: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS, Ubuntu 16.04 LTS, Ubuntu 14.04 LTS
USN-8109–1: Debian Goodies vulnerability : Debian Goodies konnte zum Absturz gebracht werden oder Programme mit Ihren Benutzerrechten ausführen, wenn eine speziell präparierte Datei geöffnet wurde.
IDs: CVE-2023–27635
Affects: Ubuntu 24.04 LTS, Ubuntu 18.04 LTS, Ubuntu 16.04 LTS, Ubuntu 14.04 LTS
USN-8108–1: Bouncy Castle vulnerabilities : In Bouncy Castle were fixed.
IDs: CVE-2025–8916, CVE-2024–30172, CVE-2024–34447 + 3 weitere
Affects: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS, Ubuntu 16.04 LTS
USN-8106–1: Valkey vulnerabilities : In Valkey were fixed.
IDs: CVE-2025–67733, CVE-2026–21863
Affects: Ubuntu 25.10, Ubuntu 24.04 LTS
USN-8105–1: FreeRDP vulnerabilities : In FreeRDP were fixed.
IDs: CVE-2026–25954, CVE-2026–22851, CVE-2026–27950 + 29 weitere
Affects: Ubuntu 25.10, Ubuntu 24.04 LTS
USN-8104–1: Flask vulnerability : Flask konnte dazu gebracht werden, sensible Informationen über das Netzwerk offenzulegen.
IDs: CVE-2026–27205
Affects: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS
USN-8103–1: Exiv2 vulnerabilities : In Exiv2 were fixed.
IDs: CVE-2026–27631, CVE-2026–27596, CVE-2025–54080 + 4 weitere
Affects: Ubuntu 25.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS, Ubuntu 16.04 LTS
USN-8102–2: snapd regression : USN-8102–1 introduced a regression in snapd.
IDs: CVE-2026–3888
Affects: Ubuntu 24.04 LTS
USN-8094–2: Linux kernel vulnerabilities : Several security issues were fixed in the Linux kernel.
IDs: CVE-2025–68727, CVE-2025–68298, CVE-2025–68258 + 169 weitere
Affects: Ubuntu 25.10, Ubuntu 24.04 LTS
USN-8095–3: Linux kernel (Real-time) vulnerabilities : Several security issues were fixed in the Linux kernel.
IDs: CVE-2025–40245, CVE-2025–40321, CVE-2025–22125 + 420 weitere
Affects: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
USN-8102–1: snapd vulnerability : snapd konnte zur Rechteausweitung missbraucht werden.
IDs: CVE-2026–3888
Affects: Ubuntu 25.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS, Ubuntu 16.04 LTS
USN-8095–2: Linux kernel (FIPS) vulnerabilities : Several security issues were fixed in the Linux kernel.
IDs: CVE-2025–40068, CVE-2025–40288, CVE-2025–40345 + 420 weitere
Affects: Ubuntu 24.04 LTS
USN-8101–1: Vim vulnerabilities : In Vim were fixed.
IDs: CVE-2026–25749, CVE-2026–28421, CVE-2026–28422 + 5 weitere
Affects: Ubuntu 25.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS, Ubuntu 16.04 LTS, Ubuntu 14.04 LTS
USN-8100–1: Linux kernel (NVIDIA) vulnerabilities : Several security issues were fixed in the Linux kernel.
IDs: CVE-2025–40245, CVE-2025–40321, CVE-2025–22125 + 422 weitere
Affects: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
USN-8097–1: Roundcube Webmail vulnerabilities : Roundcube Webmail konnte über Cross-Site Scripting zur Ausführung beliebigen Codes gebracht werden.
IDs: CVE-2025–68461
Affects: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS
USN-8095–1: Linux kernel vulnerabilities : Several security issues were fixed in the Linux kernel.
IDs: CVE-2025–39981, CVE-2025–38105, CVE-2025–40099 + 420 weitere
Affects: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
USN-8094–1: Linux kernel vulnerabilities : Several security issues were fixed in the Linux kernel.
IDs: CVE-2025–68380, CVE-2025–68754, CVE-2025–68221 + 169 weitere
Affects: Ubuntu 25.10, Ubuntu 24.04 LTS
USN-8087–2: python-cryptography regression : USN-8087–1 introduced a regression in python-cryptography.
Affects: Ubuntu 25.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
USN-8093–1: libssh vulnerability : libssh konnte zum Absturz gebracht werden oder sich unerwartet verhalten.
IDs: CVE-2026–3731
Affects: Ubuntu 25.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS, Ubuntu 16.04 LTS