This Week in TUXEDO OS #23-2025 - TUXEDO Computers

  ATTENTION: To use our store you have to activate JavaScript and deactivate script blockers!  
Thank you for your understanding!

This Week in TUXEDO OS #23-2025

Hello TUXEDO Fans and Open-Source Enthusiasts!

The weather at the Penguin headquarters in Augsburg was stormy this week, but the developers' mood remained stable. A new kernel saw the light of day in the TUXEDO world. Our KDE app of the week is the office suite Calligra. The tip of the week explains that it doesn’t always has to be Sudo.

Enjoy reading,
The TUXEDO OS Team

Note: We would like to keep you updated on the latest developments in TUXEDO OS with the TWIX series and introduce you to exciting applications as well as practical tips related to the KDE desktop and TUXEDO OS. However, this section should not be a one-way street: your feedback, ideas, and suggestions for improvement are very welcome! For this purpose, we have created a thread on Reddit, where you can reach us directly.

Updates TUXEDO OS

linux v6.11.0–118026.2624.04.1tux1

Rebase to current Ubuntu kernel
Integration of boot parameter fixes

KDE App of the Week: Office-Suite Calligra

This week’s KDE App of the Week focuses on office software. We present the Calligra Suite and compare it to LibreOffice.

LibreOffice

We ship TUXEDO OS with LibreOffice, which professionally supports all your office tasks. LibreOffice includes programs for word processing (Writer), spreadsheets (Calc), presentations (Impress), and drawing (Draw). In addition to versions for Linux, Windows, and macOS, there are also apps for Android and iOS smartphones and tablets, as well as an online version under the name LibreOffice Online available as a web app. A commercial edition of LibreOffice that can also be self-hosted is offered by Collabora Online.

LibreOffice is more comprehensive than the Calligra Suite and also targets professional users. The office suite provides a wide range of features and tools comparable to those of Microsoft Office. These include numerous extensions, add-ons, and a high level of customization. LibreOffice is regularly updated and benefits from a large developer community.

Calligra Suite

The Calligra Suite was created in 2010 as a fork of the original KOffice office software package and is aimed more at beginners and users with basic requirements. The suite offers essential applications for word processing, spreadsheets, presentations, and graphics. It is particularly user-friendly and clearly laid out, but provides significantly fewer features compared to LibreOffice. In more complex use cases—such as creating detailed organizational charts or performing advanced layout and automation tasks—Calligra reaches its limits. Like LibreOffice, Calligra is also cross-platform and available for Linux, macOS, and Windows.

The difference between the two suites becomes apparent in terms of disk space usage. While LibreOffice takes up about 1.5 GB in a standard installation, Calligra makes do with 150 MB. It consists of the word processor Calligra Words, the spreadsheet application Calligra Sheets, the presentation software Calligra Stage, and the vector graphics program Karbon.

With Calligra 4.0, the suite was updated to Qt6 and KDE Frameworks 6. At the same time, the user interface was redesigned. Additionally, the database Kexi and the project management application Plan were separated from the suite and have since been released independently.

The Calligra Suite is suitable for classic office tasks in the areas of text, spreadsheets, and presentations, and covers the needs of private users and small businesses. In TUXEDO OS, LibreOffice was preinstalled because it meets the needs of a broader user base. However, Calligra can be installed via the Discover package manager or the command line.

Info: You can find more KDE apps that were updated last week in the column This Week in KDE Apps.

TUXEDO OS Tipps & Tricks: It doesn’t always have to be sudo

We present an alternative and explain its installation and configuration.

Users working on the command line are familiar with the sudo command, which grants them the privileges of another user. In most cases, this means the role of the superuser root, which allows an unprivileged user to perform administrative tasks. This enables the user, among other things, to install updates via the package manager or modify files outside their own home directory.

Sudo

Sudo is a very powerful tool with many options and a highly detailed configuration file. However, inexperienced users can unknowingly weaken system security by making incorrect entries in the Sudoers configuration file. While sudo offers many advanced capabilities, most users only require a small subset of its features. What many users don’t know: there are lightweight alternatives to sudo that also allow users to assume the identity of another system user — but with significantly less code and a simpler configuration file.

One of these alternatives is called Doas, which can be loosely translated as “do it as.” Originally from OpenBSD, Doas has been ported to Linux in two versions. The corresponding packages are called doas and opendoas. This article refers to opendoas, which is considered the more secure variant.

In Comparison

Compared to the approximately 3.4 MB that Sudo takes up, OpenDoas is significantly smaller at just 40 KB. In terms of code, Sudo consists of 223,957 lines spread across more than 500 files, while OpenDoas is just around 400 lines total in a single file. The number of lines in a program is critical for code maintainability, potential bugs, and attack surface. Sudo has indeed been affected by security vulnerabilities multiple times over the years.

OpenDoas

During installation, opendoas is linked with the authentification modules of PAM, but no configuration file is created by default. You must create this file manually:

sudo nano /etc/doas.conf

To grant your user root privileges, insert the following line (replace USERNAME with your actual username):

permit USERNAME as root

If you want to configure opendoas for multiple users on your machine, those users must first be part of the wheel group. For example, to add the user tom:

sudo usermod -aG wheel tom

Then add the following line to the configuration file:

permit :wheel as root

If the same users previously allowed via sudo should now use doas, insert:

permit :sudo

Next, set appropriate file permissions so only root can read the configuration:

sudo chown root:root /etc/doas.conf
sudo chmod 0400 /etc/doas.conf

You can verify the correctness of your entries with:

sudo doas -C /etc/doas.conf

If everything is correct, the prompt will immediately return.

You can now begin using doas:

doas apt update

As expected, you will be asked for your password. However, doas can also be used without a password. Keep in mind that this would allow any user of your system to gain administrative privileges without authentication. If you still wish to use doas without a password, add the following line to the configuration:

permit nopass tom as root

This can also be applied to a group by including nopass in the corresponding line. You can further restrict passwordless usage to specific commands — for instance, for restarting the system:

permit nopass tom cmd /sbin/reboot

A more secure approach for systems with more than one user than using nopass is the persist option. This allows users to enter their password once and reuse it without re-authentication for the next five minutes.

A very useful feature is command auto-completion using the Tab key. While this works automatically with sudo, you need to manually enable it for Doas. Open the .bashrc file:

nano ~/.bashrc

and append the following lines to the end of the file:

if type _sudo &>/dev/null; then
    complete -o default -o bashdefault -F _sudo doas

fi

Then reload the file:

source ~/.bashrc

Tab completion should now work. With that, doas is ready to replace sudo. Additional options can be found in the man page:

man doas.conf

Users who prefer to acquire elevated rights through systemd can take a look at run0, an alternative introduced a year ago with systemd 256.

Ubuntu Security Updates

The security updates listed here from Ubuntu are directly integrated into TUXEDO OS:

  • USN-7558–1: GStreamer Bad Plugins vulnerabilities: Several security issues were fixed in GStreamer Bad Plugins.
    IDs: CVE-2023–50186, CVE-2024–0444, CVE-2025–3887
    Affects: Ubuntu 25.04, Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS

  • USN-7556–1: Bootstrap vulnerabilities: Several security issues were fixed in Bootstrap.
    IDs: CVE-2024–6531, CVE-2024–6484, CVE-2024–6485
    Affects: Ubuntu 25.04, Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS, Ubuntu 16.04 LTS

  • USN-7555–1: Django vulnerability: Django could be made to log injection if received specially crafted input.
    IDs: CVE-2025–48432
    Affects: Ubuntu 25.04, Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS

  • USN-7551–1: libvpx vulnerability: libvpx could be made to crash if it received specially crafted input.
    IDs: CVE-2025–5283
    Affects: Ubuntu 25.04, Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS, Ubuntu 16.04 LTS

  • USN-7549–1: Twig vulnerability: Twig could be made to expose sensitive information if it opened a specially crafted file.
    IDs: CVE-2024–45411
    Affects: Ubuntu 24.10, Ubuntu 24.04 LTS

  • USN-7548–1: MariaDB vulnerabilities: Several security issues were fixed in MariaDB.
    IDs: CVE-2025–30722, CVE-2025–30693, CVE-2023–52970, and 2 others
    Affects: Ubuntu 25.04, Ubuntu 24.04 LTS

  • USN-7547–1: Tornado vulnerability: Tornado could be made to consume excessive resources when processing specially crafted HTTP requests.
    IDs: CVE-2025–47287
    Affects: Ubuntu 25.04, Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS

Current BIOS/EC Versions

An EC/BIOS update affects key system components. Please ensure that you follow the instructions carefully and take your time. The process is usually completed quickly. If you have any doubts, our support team is happy to assist you. The following devices have BIOS/EC updates available:

Model CPU GPU BIOS EC
Aura 14 Gen 3 (PU2)     1.07.13RTR 1.07.05BTR4
Aura 14 Gen 3 (AU2)     1.07.12RTR  
Aura 15 Gen 3 (PU)     1.07.13RTR 1.07.05TR5
Aura 15 Gen 3 (AU)     1.07.12RTR 1.07.04TR1
Gemini 17 Gen3   GeForce RTX 4060 /4070 1.07.04RTR1 1.07.05tTR1