What does Legibus et Arm

Arm Security Updates

Speculative processor vulnerability


Based on the recent research findings from Google on the potential new cache timing side-channels exploiting processor speculation, here is the latest ...

GPU-initiated 'Rowhammer' attack


Security experts have newly identified a way to initiate a so-called 'Rowhammer' attack on DDR memory by using a malicious WebGL program. This vulnera ...

Mali GPU Driver Vulnerabilities


In certain circumstances, some versions of the Mali GPU Kernel driver can become compromised.

Armv8-M Stack Sealing vulnerability


A report has been presented to Arm which shows that software executing on Armv8-M processors may be vulnerable to stack underflow techniques on un-ini ...

Arm Compiler 5 stack protection


In certain circumstances, the stack protection feature of Arm Compiler 5 can be rendered ineffective, potentially leaving application code vulnerable ...