The fix is reported from https://github.com/mithril-security/poison-tea.
## Description Fix an attestation bypass attack reported from https://github.com/mithril-security/poison-tea. Fixes # (issue) ## Type of change (select or add applied and delete the others) - [X] Bug fix (non-breaking change which fixes an issue) - [ ] New feature (non-breaking change which adds functionality) - [ ] Breaking change (fix or feature that would cause existing functionality to not work as expected) - [ ] API change with a documentation update - [ ] Additional test coverage - [ ] Code cleanup or just sync with upstream third-party crates ## How has this been tested? ## Checklist - [X] Fork the repo and create your branch from `master`. - [ ] If you've added code that should be tested, add tests. - [ ] If you've changed APIs, update the documentation. - [X] Ensure the tests pass (see CI results). - [X] Make sure your code lints/format. You can view, comment on, or merge this pull request online at: https://github.com/apache/incubator-teaclave/pull/679 -- Commit Summary -- * Check the binding of the server certificate with the sgx quote -- File Changes -- M sdk/python/teaclave.py (15) -- Patch Links -- https://github.com/apache/incubator-teaclave/pull/679.patch https://github.com/apache/incubator-teaclave/pull/679.diff -- Reply to this email directly or view it on GitHub: https://github.com/apache/incubator-teaclave/pull/679 You are receiving this because you are subscribed to this thread. Message ID: <apache/incubator-teaclave/pull/6...@github.com>