How are you determining the server? Checking process traffic? You have identified a pattern though which is interesting, I might look for the same thing in the future. I don't think it is a Linux issue but buggy server software. Sometimes but super rarely I can see a lot of packet loss or ping in the in-game performance monitor but almost always see one of the icons, cannot recall which one. I get half-dead servers pretty often and it happened the same on Windows too but in my case it is really rubberbandy and like running in dreams. I really wanted to play some ranked more, but with the lag in most of my games it's almost impossible. If anyone has seen something like this and has any idea if there's anything I can do to fix it, I would be very grateful. Wired connection with high quality fiber internet. I use Nobara Linux (Fedora) with ProtonGE and x11 with an Nvidia card. When I ping the servers from my terminal, there's no extra delay. I haven't seen anyone else have this same issue, but I've tried every possible trick to fix it that I could think of myself or find online, but those solutions were usually to fix things like packet loss which this is not. I don't know if this is a Linux only issue, and I don't have a Windows machine to test it on, but it is really annoying. It's fine then if I play on the same server on the same game mode for a bit, but the game often switches servers to find games in ranked with enough people so most of the time I'll just have 120+ms ping for ranked games unless I'm lucky and get the same server twice. Over the past few season, I've seen this issue where the first time I connect to a server, it'll have an extra 100ms ping for seemingly no reason for the entire match, but the next match on the same server it'll go back to normal. One or both of those things might be worth trying if nothing else works. ![]() The hard drive that the game was installed on seemed to make the difference, although I'm not 100% that was the fix as that was combined with resetting my install to default before reinstalling Apex. Developers of such applications must put in a high level of scrutiny to ensure their security.Edit: If anyone happens to run across this post in the future with the same issue. a missing origin check) can lead to severe consequences (drive-by RCE from any browser with the vulnerable application running in the background). In this environment, even relatively small vulnerabilities (e.g. demonstrate the additional risk associated with such marketplaces. Unfortunately, this is not the only situation in which an unpatched vulnerability in Linux Pling can become dangerous as a similar XSS flaw was uncovered in the GNOME Shell Extensions marketplace. ![]() The XSS gets triggered inside the Pling app while it’s running in the background allowing the JavaScript code to establish a connection to the local WebSocket server that’s used to listen to messages from the app, and also to send messages in order to execute arbitrary native code by downloading and executing an. It all starts with a user that visits a malicious website using the browser. As it turns out, that mechanism can be exploited by any website to run arbitrary native code while the PlingStore app is open in the background. The concerning fact is that this unpatched vulnerability in Linux Pling can allow for a supply-chain attack XSS worm in which a JavaScript payload could be exploited by an adversary to upload versions of software that are containing trojans and also to be able to tweak the metadata of a victim’s listing in order to include and propagate the attack code.Īs the application can install other applications, it has another built-in mechanism to execute code on the level. This specific unpatched vulnerability in Linux Pling is stemming from the manner in which the store’s product listings page parses HTML or embedded media fields, therefore potentially allowing an attacker to inject malicious JavaScript code that could result in arbitrary code execution. PlingStore is an Installer and Content Management App for OCS-compatible websites like, ,, that allows users to download, install and apply desktop themes, icon themes, wallpapers, or mouse cursors directly under various desktop environments using the “Install”-button. Some of the Pling-based app stores impacted by the flaw are, ,, , and. The native PlingStore application is affected by an RCE vulnerability, which can be triggered from any website while the app is running. Linux marketplaces that are based on the Pling platform are vulnerable to a wormable with the potential for a supply-chain attack. The newly discovered unpatched vulnerability in Linux Pling is affecting Pling-based free and open-source software (FOSS) marketplaces for the Linux platform and has the potential to be abused in order to stage supply-chain attacks and achieve remote code execution (RCE).
0 Comments
Leave a Reply. |