Hello TUXEDO Fans and Open-Source Enthusiasts!
This week, we serve you a fresh portion of Linux news straight from the TUXEDO igloo. The Good: Linux has made it! For the first time, our favorite operating system is approaching the 5 percent mark on US desktops. And according to a survey by PC Games Hardware , 25% of participants either use Linux exclusively or at least in a dual-boot setup. The penguin can proudly puff out its chest – even if, in reality, it’s just the inflated down jacket in the data center.
The Bad: Less cheerful is the news from Intel: Clear Linux is being discontinued . For many, just a footnote, but we open-source nerds mourn every project that hangs up its compiler. And then there’s The Ugly: Malware in the AUR . Again. Arch users take it in stride – anyone who voluntarily lives on the „bleeding edge“ knows how to handle sharp edges.
But don’t worry, everything is running smoothly here. While packages shake outside, we’re busy pimping things inside: CopyQ and Klipper make the clipboard smarter, Mozilla delivers fresh updates for Firefox and Thunderbird, and as always, we are tinkering with small improvements to make your daily life with TUXEDO OS more pleasant. So: kick back, open your terminal, and enjoy the read!
Enjoy reading,
The TUXEDO OS Team
Note: We would like to keep you updated on the latest developments in TUXEDO OS with the TWIX series and introduce you to exciting applications as well as practical tips related to the KDE desktop and TUXEDO OS. However, this section should not be a one-way street: your feedback, ideas, and suggestions for improvement are very welcome! For this purpose, we have created a thread on Reddit, where you can reach us directly.
Updates TUXEDO OS
Firefox 141.0
Especially interesting for Linux users
Reduced RAM usage on Linux: More resource-efficient browser operation.
No more restart after package manager updates: Updates take effect immediately without interruption.
New features
AI-powered tab grouping: Locally running AI detects similar tabs, groups them automatically, and suggests names. Gradual rollout (More details ).
Customizable sidebar for vertical tabs: Tools in the lower area can now be hidden – more space for tabs.
Address bar calculator & unit conversion: Calculates directly in the URL bar (e.g., “10 km in mi” or “10am EDT to CET”). Results can be copied (More details ).
Mesa 25.1.6
v3dv: Fixed regression in vkAllocateMemory with imported GBM buffer.
Vulkan WSI / Zink: Threads were used under X11 even with non-thread-safe X connections – behavior corrected.
sddm-greeter-qt: Fixed segfault when using nvk + zink.
Release Notes
Security Updates
Chromium 138.0.7204.168
CVE-2025–8010: Type confusion in V8 – high risk, potentially exploitable for code execution.
CVE-2025–8011: Type confusion in V8 – high risk vulnerability in the JavaScript engine.
Chromium 138.0.7204.157
CVE-2025–7656: Integer overflow in V8 – may cause memory errors and crashes.
CVE-2025–6558: Insufficient input validation in ANGLE (graphics abstraction layer) and GPU code – potential security flaw when processing external data.
CVE-2025–7657: Use-after-free in WebRTC – dangerous memory vulnerability related to real-time communication handling.
xwayland 24.1.7
CVE-2025–49175: Out-of-bounds access in the X Rendering Extension during animated cursor rendering.
CVE-2025–49176: Integer overflow in the Big Requests Extension – could lead to memory errors.
CVE-2025–49177: Data leak in the XFIXES Extension v6 – affected XFixesSetClientDisconnectMod
.
CVE-2025–49178: Unhandled client requests due to manipulated „bytes to ignore“ fields.
CVE-2025–49179: Integer overflow in the X Record Extension, potentially exploitable for memory errors.
CVE-2025–49180: Integer overflow in the RandR Extension (RRChangeProviderProperty).
qt6-base (CVE fixes) 6.8.2+dfsg-9~tux1
Backport patch to correct the PQ-EOTF formula for BT.2100. This patch is required to apply the fix for CVE-2025–5992.
Backport patch to fix CVE-2025–5992 (Closes: Bug #1109299 ).
KDE App of the Week: CopyQ – Clipboard with System
Anyone who works a lot on the computer knows: the clipboard is an essential part of every workflow. KDE Plasma comes with Klipper by default, a clipboard management tool that not only stores the last copied item but can keep up to 2048 entries in its history. In today’s Tips and Tricks edition, we take a closer look at Klipper.
The KDE App of the Week is basically Klipper on steroids . We mean CopyQ , a powerful clipboard manager written in Qt for KDE and other desktop environments that extends the system-wide clipboard with history, organization tools, scripting capabilities, and a flexible user interface. With CopyQ, simple copy-paste turns into a true productivity tool.
Features at a Glance
CopyQ expands the classic clipboard with a wide range of practical features. The application automatically saves all copied content–whether plain text, HTML fragments, images, or even file lists. CopyQ recognizes the respective MIME types and manages them accordingly, so you can retrieve specific items even days later.
CopyQ provides access to all entries both via the main window and the system tray icon, keeping frequently used content always within reach.
Especially helpful is the integrated search function, which lets you efficiently browse even long histories. Individual entries can be edited, commented on, or tagged as needed–ideal for making notes on specific content.
For better organization, CopyQ also allows you to sort the clipboard into tabs. This way, for example, work-related and private content can be separated or grouped thematically. Those who want to dive deeper can create their own rules and automations based on JavaScript. This enables automatic modification of certain content or triggering external programs–a major advantage for advanced users.
The CopyQ user interface is highly customizable. Tabs, layout, and features can be individually configured to optimally adapt the clipboard to your workflow.
You can operate CopyQ either via the system tray icon or through customizable keyboard shortcuts. CopyQ integrates unobtrusively into the desktop while remaining quickly accessible at all times.
Installation on TUXEDO OS
CopyQ is available in the official package repositories and can be installed directly via Discover or the terminal:
sudo apt install copyq
After the first start, you’ll find the icon in the system tray, where the application runs in the background.
Note on Usage under Wayland
Clipboard issues can occasionally occur under Wayland. In this case, the following workaround helps:
env QT_QPA_PLATFORM=xcb copyq
To apply this setting permanently, edit the autostart file as follows:
nano ~/.config/autostart/copyq.desktop
Change the line starting with Exec= to:
Exec=env QT_QPA_PLATFORM=xcb copyq
CopyQ is aimed at everyone who wants to get more out of their clipboard. Especially for power users or developers, the app can be a real productivity booster. A comprehensive documentation helps with getting started on advanced topics like automation and scripting.
Info: Are you interested in more KDE applications and want to know which programs have been recently updated? A detailed overview can be found in the regularly published column This Week in KDE Apps , which summarizes new features, bug fixes, and developments from the KDE ecosystem on a weekly basis.
TUXEDO OS Tips & Tricks: Klipper, the Versatile Clipboard Manager
Anyone who has worked with clipboard history on Windows 10 or 11 knows its value for fast desktop workflows. Under TUXEDO OS, which is based on KDE Plasma, a significantly more powerful and open-source alternative is available: Klipper.
What is Klipper?
Klipper is the integrated clipboard manager of the KDE Plasma desktop environment. While the application is simply called Clipboard in the user interface, it carries the internal name “Klipper” within the KDE project. The software not only manages current copy operations but can also store past contents on demand and make them available again.
Operation is done via the key combination Meta + V . Afterwards, the desired entry can be selected by mouse click or with arrow keys and Enter . Alternatively, Klipper can be accessed via the clipboard icon in the system tray.
You can directly open the clipboard history using Meta + V or via the icon in the system tray.
More Than Just Copy & Paste
Unlike Windows, where clipboard history is limited to 25 entries, Klipper can store up to 2,048 items if desired. Especially practical is the integrated search function: as soon as the history is opened, Klipper automatically filters according to typed keywords. Additionally, automatic actions can be defined that react to specific content – for example, when copying a URL or a file path.
Custom actions allow automated reactions to clipboard contents, such as opening URLs or running scripts.
In this example, a dialog window opens automatically whenever a URL is copied to the clipboard.
Another feature is the “Select-to-Copy” mode. When this function is enabled, simply highlighting text with the mouse cursor is enough to automatically copy the content to the clipboard – manual copying via Ctrl + C is no longer necessary. You can activate this mode under Settings and the option Synchronize selection and clipboard under General . As in the terminal, the highlighted text can then be pasted by clicking the middle mouse button.
Klipper stores not only text but also files and folders. Furthermore, a QR code can be generated for each entry, which simplifies transferring information – such as Wi-Fi credentials or URLs – to mobile devices. The integrated editor allows entries to be edited directly in the clipboard.
Integration with KDE Connect
The default key combination Meta + V can be customized if needed. Additionally, activating further shortcuts is recommended – for example, Shift + Meta + X to clear the entire clipboard history. This option supports privacy protection, especially on shared systems.
Functionality can be extended via KDE Connect: this enables cross-device clipboard synchronization between TUXEDO OS and mobile devices – locally, encrypted, and without external cloud services.
Ubuntu Security Updates
The security updates listed here from Ubuntu are directly integrated into TUXEDO OS:
USN-7651–6: Linux kernel (Raspberry Pi) vulnerabilities : Several security issues were fixed in the Linux kernel.
IDs: CVE-2025–21830, CVE-2024–57997, CVE-2024–58081 + 114 others
Affects: Ubuntu 24.04 LTS
USN-7670–1: iputils vulnerability : iputils could be made to consume resources and crash if it received specially crafted network traffic.
IDs: CVE-2025–48964, CVE-2025–47268
Affects: Ubuntu 25.04, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
USN-7665–2: Linux kernel (AWS) vulnerabilities : Several security issues were fixed in the Linux kernel.
IDs: CVE-2025–37933, CVE-2025–37930, CVE-2025–37907 + 49 others
Affects: Ubuntu 24.04 LTS
USN-7651–5: Linux kernel (Raspberry Pi Real-time) vulnerabilities : Several security issues were fixed in the Linux kernel.
IDs: CVE-2025–21801, CVE-2025–21754, CVE-2024–58005 + 114 others
Affects: Ubuntu 24.04 LTS
USN-7666–1: Unbound vulnerabilities : The Unbound cache could be poisoned if it received specially crafted network traffic.
IDs: CVE-2025–5994
Affects: Ubuntu 25.04, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
USN-7651–4: Linux kernel (GCP) vulnerabilities : Several security issues were fixed in the Linux kernel.
IDs: CVE-2025–21804, CVE-2025–21799, CVE-2024–57982 + 114 others
Affects: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
USN-7662–1: GDK-PixBuf vulnerabilities : Several security issues were fixed in GDK-PixBuf.
IDs: CVE-2025–6199, CVE-2025–7345
Affects: Ubuntu 25.04, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS, Ubuntu 16.04 LTS
USN-7651–3: Linux kernel vulnerabilities : Several security issues were fixed in the Linux kernel.
IDs: CVE-2025–21804, CVE-2025–21799, CVE-2024–57982 + 114 others
Affects: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
USN-7661–1: GoBGP vulnerabilities : Several security issues were fixed in GoBGP.
IDs: CVE-2025–43970, CVE-2025–43972, CVE-2025–43971 + 2 others
Affects: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS
USN-7660–1: fdkaac vulnerabilities : Several security issues were fixed in fdkaac.
IDs: CVE-2022–36148, CVE-2022–37781, CVE-2023–34824 + 1 other
Affects: Ubuntu 25.04, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 LTS, Ubuntu 18.04 LTS, Ubuntu 16.04 LTS
USN-7657–1: jq vulnerabilities : Several security issues were fixed in jq.
IDs: CVE-2025–48060, CVE-2024–23337, CVE-2024–53427
Affects: Ubuntu 25.04, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS
USN-7656–1: Erlang vulnerabilities : Several security issues were fixed in Erlang.
IDs: CVE-2025–46712, CVE-2025–4748
Affects: Ubuntu 25.04, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS