回复:Welcoming Yuan Zhuang (@yuanz) as Teaclave committer

2021-11-01 Thread Yuan Zhuang
Dear Teaclave community, I am glad to become a committer in the Teaclave project. I will continue to work on contributing code to Teaclave TrustZone SDK or other repositories. Thanks to Mingshen and the community! Best, Yuan Zhuang 在 2021年11月2日 09:44,Mingshen Sun 写道: Dear Teaclave community,

[apache/incubator-teaclave] The founder "keys" and the file "KEYS" are conflict (Issue #571)

2021-11-01 Thread ouliuquan
When using the git clone, it will be conflict in Windows. Should we rename one of them to another name? -- You are receiving this because you are subscribed to this thread. Reply to this email directly or view it on GitHub: https://github.com/apache/incubator-teaclave/issues/571

Re:Welcoming Rong Fan (@fanrong) as Teaclave committer

2021-11-01 Thread 樊荣
Hi Teaclave community, I am very honored to join the community. I will continue to work hard to contribute to the development of the community. Please advise, thanks. Best regards, Rong Fan At 2021-11-02 09:44:32, "Mingshen Sun" wrote: >Dear Teaclave community, > >Please welcome Rong

Welcoming Yuan Zhuang (@yuanz) as Teaclave committer

2021-11-01 Thread Mingshen Sun
Dear Teaclave community, Please welcome Yuan Zhuang (@yuanz) to join the Teaclave community as a committer. Yuan started working on Teaclave TrustZone SDK for about half year ago and made several major contributions [1] to the project including: - update for OP-TEE 3.11.0 - support for new TEE A

Welcoming Rong Fan (@fanrong) as Teaclave committer

2021-11-01 Thread Mingshen Sun
Dear Teaclave community, Please welcome Rong Fan (@fanrong) to join the Teaclave community as a committer. Rong started working on Teaclave TrustZone SDK for about half year ago and made several major contributions [1] to the project including: - keep update with the latest OP-TEE versions - use

Security Advisory of SmashEx and CVE-2021-0186

2021-11-01 Thread Mingshen Sun
Hi Teaclave Community, Recently, we were notified of a re-entrancy vulnerability in the exception handling designs of some popular SGX SDKs (including Intel SGX SDK), resulting in arbitrary disclosure of enclave private memory and code-reuse attacks in SGX enclave. The vulnerability is named as S

Re: [apache/incubator-teaclave] [WAMR] Fix leaked resources (PR #569)

2021-11-01 Thread Qinkun Bao
> Good to see unloading the WASM's workload gracefully by adding corresponding > native callbacks and preventing resource from leaking. However, there is a > following issue identified by CI > > ``` > thread '' panicked at 'assertion failed: self.buffer.is_empty() || > self.opt.cmp.cmp(self.

Re: [apache/incubator-teaclave] Update crates-sgx (PR #570)

2021-11-01 Thread Mingshen Sun
Merged #570 into master. -- You are receiving this because you are subscribed to this thread. Reply to this email directly or view it on GitHub: https://github.com/apache/incubator-teaclave/pull/570#event-5551474356