Our developer penguins in the Webdev igloo had nimble flippers, thanks to steaming fish soup and a hearty mackerel stew! And now, we’re proud to announce: Habemus RSS feeds! After a long wait, our developers have finally rolled out feeds for our This Week in TUXEDO OS column and our news updates. From now on, you can follow all the latest straight from the editorial igloo right in your RSS reader. A heartfelt thank you for your patience!
By the way, the latest TWIX is packed with exciting updates – including new drivers and a whole bunch of fixes for TUXEDO OS. So go ahead, take a look – our penguins haven’t just been cooking, they’ve been hard at work under the hood too!
RSS feeds are a convenient way to automatically subscribe to content from websites – perfect for staying up to date with new blog posts, news, or online columns like our This Week in TUXEDO OS series. With an RSS reader like RSS Guard, you can manage such feeds locally – no cloud connection required, open source, and easy on system resources.
The RSS feeds from TUXEDO Computers are now live and give you a convenient way to stay on top of all the latest content. A complete overview of all available feeds – including direct links and usage tips – can be found in our dedicated article: Subscribe to TUXEDO via RSS Feed.
Especially in dark environments or during extended work sessions, reducing screen colors can be quite soothing. A full grayscale mode helps reduce eye strain and minimize visual distractions – particularly on color-heavy websites or in vibrant applications.
On TUXEDO OS with KDE Plasma 6, you can enable such an effect system-wide. Currently, however, it’s not available directly through the KDE System Settings download section and needs to be installed manually.
Click the configure icon next to the effect to fine-tune its behavior – for example, exclude panels, apply the effect only to inactive windows, or adjust the intensity.
To easily switch between color and grayscale mode, you can create a custom keyboard shortcut:
If you decide to remove the effect later on, run the following commands in the terminal:
Afterward, the effect will no longer appear in System Settings. As before, this removal only applies to the current user session.
The security updates listed here from Ubuntu are directly integrated into TUXEDO OS:
-
USN-7504–1: LibreOffice vulnerability: LibreOffice could accept fraudulent digital signatures.
IDs: CVE-2025–2866
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 ESM
-
USN-7503–1: h11 vulnerability: python-h11 could be made to expose sensitive information over the network.
IDs: CVE-2025–43859
Affects: Ubuntu 25.04, Ubuntu 24.10, Ubuntu 24.04 LTS
-
USN-7501–2: Django vulnerability: Django could be made to crash if it received specially crafted network traffic.
IDs: CVE-2025–32873
Affects: Ubuntu 18.04 ESM
-
USN-7502–1: Horde Css Parser vulnerability: Horde Css Parser could be made to crash or run programs as your login if it opened a specially crafted file.
IDs: CVE-2020–13756
Affects: Ubuntu 18.04 ESM, Ubuntu 16.04 ESM
-
USN-7501–1: Django vulnerability: Django could be made to crash if it received specially crafted network traffic.
IDs: CVE-2025–32873
Affects: Ubuntu 25.04, Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 ESM
-
USN-7490–3: libsoup vulnerabilities: Several security issues were fixed in libsoup.
IDs: CVE-2025–32913, CVE-2025–32909, CVE-2025–32906, and 6 others
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
-
USN-7489–2: Linux kernel (Real-time) vulnerability: The system could be made to crash under certain conditions.
IDs: CVE-2025–21813
Affects: Ubuntu 24.10
-
USN-7500–2: Linux kernel (Azure) vulnerabilities: Several security issues were fixed in the Linux kernel.
IDs: CVE-2024–56653, CVE-2025–21953
Affects: Ubuntu 22.04 LTS
-
USN-7496–5: Linux kernel (Azure FIPS) vulnerabilities: Several security issues were fixed in the Linux kernel.
IDs: CVE-2023–52741, CVE-2023–52927, CVE-2024–56631, and 30 others
Affects: Ubuntu 18.04 ESM
-
USN-7496–4: Linux kernel (Azure) vulnerabilities: Several security issues were fixed in the Linux kernel.
IDs: CVE-2024–56650, CVE-2024–36015, CVE-2024–56642, and 30 others
Affects: Ubuntu 14.04 ESM
-
USN-7496–3: Linux kernel (Azure) vulnerabilities: Several security issues were fixed in the Linux kernel.
IDs: CVE-2023–52741, CVE-2023–52927, CVE-2024–56631, and 30 others
Affects: Ubuntu 18.04 ESM, Ubuntu 16.04 ESM
-
USN-7495–3: Linux kernel (Azure) vulnerabilities: Several security issues were fixed in the Linux kernel.
IDs: CVE-2023–52927, CVE-2023–52664, CVE-2024–26689
Affects: Ubuntu 20.04 ESM
-
USN-7494–5: Linux kernel (Azure FIPS) vulnerabilities: Several security issues were fixed in the Linux kernel.
IDs: CVE-2023–52927, CVE-2023–52664
Affects: Ubuntu 22.04 LTS
-
USN-7494–4: Linux kernel (Azure) vulnerabilities: Several security issues were fixed in the Linux kernel.
IDs: CVE-2023–52927, CVE-2023–52664
Affects: Ubuntu 22.04 LTS, Ubuntu 20.04 ESM
-
USN-7500–1: Linux kernel (Azure) vulnerabilities: Several security issues were fixed in the Linux kernel.
IDs: CVE-2024–56653, CVE-2025–21953
Affects: Ubuntu 24.04 LTS
-
USN-7499–1: Linux kernel (Azure) vulnerabilities: Several security issues were fixed in the Linux kernel.
IDs: CVE-2025–21813, CVE-2025–21953
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS
-
USN-7498–1: Linux kernel vulnerability: The system could be made to crash or run programs as an administrator.
IDs: CVE-2024–56598
Affects: Ubuntu 14.04 ESM
-
USN-7496–2: Linux kernel (FIPS) vulnerabilities: Several security issues were fixed in the Linux kernel.
IDs: CVE-2023–52741, CVE-2023–52927, CVE-2024–56631, and 30 others
Affects: Ubuntu 18.04 ESM
-
USN-7496–1: Linux kernel vulnerabilities: Several security issues were fixed in the Linux kernel.
IDs: CVE-2023–52741, CVE-2023–52927, CVE-2024–56631, and 30 others
Affects: Ubuntu 18.04 ESM, Ubuntu 16.04 ESM
-
USN-7497–1: CarrierWave vulnerabilities: Several security issues were fixed in CarrierWave.
IDs: CVE-2021–21305, CVE-2023–49090
Affects: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 ESM, Ubuntu 18.04 ESM
-
USN-7490–2: libsoup regression: USN-7490–1 introduced a regression in libsoup. ID: CVE-2025–32912
Affects: Ubuntu 25.04, Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 ESM, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM
-
USN-7488–1: Python vulnerabilities: Several security issues were fixed in Python.
IDs: CVE-2024–11168, CVE-2024–6232, CVE-2024–9287
Affects: Ubuntu 24.10, Ubuntu 22.04 LTS, Ubuntu 20.04 ESM, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM, Ubuntu 14.04 ESM
-
USN-7495–2: Linux kernel (FIPS) vulnerabilities: Several security issues were fixed in the Linux kernel.
IDs: CVE-2023–52927, CVE-2023–52664, CVE-2024–26689
Affects: Ubuntu 20.04 ESM
-
USN-7495–1: Linux kernel vulnerabilities: Several security issues were fixed in the Linux kernel.
IDs: CVE-2023–52927, CVE-2023–52664, CVE-2024–26689
Affects: Ubuntu 20.04 ESM, Ubuntu 18.04 ESM
-
USN-7494–3: Linux kernel (Real-time) vulnerabilities: Several security issues were fixed in the Linux kernel.
IDs: CVE-2023–52927, CVE-2023–52664
Affects: Ubuntu 22.04 LTS
-
USN-7494–2: Linux kernel (FIPS) vulnerabilities: Several security issues were fixed in the Linux kernel.
IDs: CVE-2023–52927, CVE-2023–52664
Affects: Ubuntu 22.04 LTS
-
USN-7494–1: Linux kernel vulnerabilities: Several security issues were fixed in the Linux kernel.
IDs: CVE-2023–52927, CVE-2023–52664
Affects: Ubuntu 22.04 LTS, Ubuntu 20.04 ESM
-
USN-7493–1: Linux kernel (Raspberry Pi) vulnerabilities: The system could be made to crash under certain conditions. ID: CVE-2024–58081
Affects: Ubuntu 24.04 LTS
-
USN-7492–2: Linux kernel (Real-time) vulnerability: The system could be made to crash or run programs as an administrator. ID: CVE-2024–56653
Affects: Ubuntu 24.04 LTS
-
USN-7492–1: Linux kernel vulnerability: The system could be made to crash or run programs as an administrator. ID: CVE-2024–56653
Affects: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
-
USN-7489–1: Linux kernel vulnerability: The system could be made to crash under certain conditions.
IDs: CVE-2025–21813
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS
-
USN-7486–1: FastCGI vulnerability: FastCGI could be made to crash or execute arbitrary code.
IDs: CVE-2025–23016
Affects: Ubuntu 25.04, Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
-
USN-7485–1: LibRaw vulnerabilities: LibRaw could be made to crash if it received specially crafted input.
IDs: CVE-2025–43961, CVE-2025–43964, CVE-2025–43962, and 1 other
Affects: Ubuntu 25.04, Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 ESM, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM
-
USN-7484–1: OpenJDK 24 vulnerabilities: Several security issues were fixed in OpenJDK 24.
IDs: CVE-2025–30691, CVE-2025–30698, CVE-2025–21587
Affects: Ubuntu 25.04, Ubuntu 24.10
-
USN-7483–1: OpenJDK 21 vulnerabilities: Several security issues were fixed in OpenJDK 21.
IDs: CVE-2025–30691, CVE-2025–30698, CVE-2025–21587
Affects: Ubuntu 25.04, Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 ESM
-
USN-7482–1: OpenJDK 17 vulnerabilities: Several security issues were fixed in OpenJDK 17.
IDs: CVE-2025–30691, CVE-2025–30698, CVE-2025–21587
Affects: Ubuntu 25.04, Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 ESM, Ubuntu 18.04 ESM
-
USN-7481–1: OpenJDK 11 vulnerabilities: Several security issues were fixed in OpenJDK 11.
IDs: CVE-2025–30698, CVE-2025–21587, CVE-2025–30691
Affects: Ubuntu 25.04, Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 ESM, Ubuntu 18.04 ESM
-
USN-7480–1: OpenJDK 8 vulnerabilities: Several security issues were fixed in OpenJDK 8.
IDs: CVE-2025–30698, CVE-2025–21587, CVE-2025–30691
Affects: Ubuntu 25.04, Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 ESM, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM
-
USN-7479–1: MySQL vulnerabilities: Several security issues were fixed in MySQL.
IDs: CVE-2025–30722, CVE-2025–30689, CVE-2025–21579, and 24 others
Affects: Ubuntu 25.04, Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 ESM
-
USN-7476–1: Scrapy vulnerabilities: Several security issues were fixed in python-scrapy.
IDs: CVE-2024–3574, CVE-2024–1892, CVE-2024–1968, and 3 others
Affects: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 ESM, Ubuntu 18.04 ESM
-
USN-7478–1: Corosync vulnerability: Corosync could be made to crash if it received specially crafted network traffic.
IDs: CVE-2025–30472
Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 ESM
-
USN-7477–1: c-ares vulnerability: c-ares could be made to crash if it received specially crafted network traffic.
IDs: CVE-2025–31498
Affects: Ubuntu 25.04, Ubuntu 24.10
-
USN-7475–1: Linux kernel (Xilinx ZynqMP) vulnerabilities: Several security issues were fixed in the Linux kernel.
IDs: CVE-2022–0995, CVE-2024–56658, CVE-2025–21993, and 13 others
Affects: Ubuntu 22.04 LTS
-
USN-7461–3: Linux kernel (Xilinx ZynqMP) vulnerabilities: Several security issues were fixed in the Linux kernel.
IDs: CVE-2024–53237, CVE-2021–47119, CVE-2024–56651, and 8 others
Affects: Ubuntu 20.04 ESM