Red Hat Enterprise Linux 3
CSV information ?
Status | archived |
---|---|
Valid from | 01.02.2004 |
Valid until | 05.03.2013 |
Scheme | 🇬🇧 UK |
Manufacturer | Oracle Corporation |
Category | Operating Systems |
Security level | EAL2 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Hash functions
MD5Vendor
BroadcomSecurity level
EAL2, EAL1, EAL7Security Functional Requirements (SFR)
FAU_GEN.1, FDP_RIP.3, FDP_RIP.2, FIA_USB.1Certificates
CERTIFICATION REPORT No. P200Certification process
out of scope, covered only the command line interface of Red Hat Enterprise Linux. Graphical interfaces were out of scope of the evaluation. 2. Each platform under test was connected via a hub to a platform running RedCertification process
out of scope, covered only the command line interface of Red Hat Enterprise Linux. Graphical interfaces were out of scope of the evaluation. 2. Each platform under test was connected via a hub to a platform running RedStandards
CCIMB-99-031, CCIMB-99-032, CCIMB-99-033File metadata
Title: | LFS_T445_Linux_CertRep_P200_10final.doc |
---|---|
Author: | racook |
Creation date: | D:20040227102521Z |
Modification date: | D:20131119171508Z |
Pages: | 28 |
Creator: | LFS_T445_Linux_CertRep_P200_10final - Microsoft Word |
Producer: | Acrobat PDFWriter 5.0 for Windows NT |
References
IncomingSecurity target ?
Extracted keywords
Hash functions
MD5Protocols
SSHSecurity level
EAL 2, EAL2Claims
O.AUTHORIZATION, O.DISCRETIONARY_ACCESS, O.AUDITING, O.RESIDUAL_INFORMATION, O.MANAGE, O.ENFORCEMENT, O.INSTALL, O.PHYSICAL, O.CREDEN, A.LOCATE, A.PROTECT, A.MANAGE, A.NO_EVIL_ADM, A.COOP, A.PEER, A.CONNECTSecurity Assurance Requirements (SAR)
ACM_CAP.2, ADO_DEL.1, ADO_IGS.1, ADV_FSP.1, ADV_HLD.1, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_SOF.1, AVA_VLA.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_STG.1, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_STG.1.1, FAU_STG.1.2, FDP_ACC.1, FDP_ACF.1, FDP_RIP.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.2.1, FDP_RIP.3, FDP_RIP.3.1, FDP_RIP, FIA_ATD.1, FIA_SOS.1, FIA_UAU.2, FIA_UAU.7, FIA_UID.2, FIA_USB.1, FIA_ATD.1.1, FIA_UAU.2.1, FIA_UAU.7.1, FIA_UID.2.1, FIA_USB.1.1, FIA_UID.1, FIA_UAU.1, FIA_USB, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_REV.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_AMT.1, FPT_RVM.1, FPT_SEP.1, FPT_STM.1, FPT_AMT.1.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_STM.1.1File metadata
Title: | Untitled Document |
---|---|
Creation date: | D:00000101000000Z |
Modification date: | D:20040227102437Z |
Pages: | 45 |
Creator: | Windows NT 4.0 |
Producer: | GNU Ghostscript 7.05 |
References
Incoming- BSI-DSZ-CC-0402-2008 - Oracle Label Security for Oracle Database 10g Release 2 (10.2.0.3) Enterprise Edition with Critical Patch Update July 2007
Heuristics ?
Extracted SARs
AVA_SOF.1, AVA_VLA.1, ADV_RCR.1, ATE_IND.2, AGD_ADM.1, ATE_FUN.1, AGD_USR.1, ADV_FSP.1, ATE_COV.1, ADV_HLD.1References ?
Updates ?
-
15.02.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e39133eecf44e09b956f806bed73ccb47af20cc34bd152113731ffd2a533fff3', 'txt_hash': 'b0cab3e6ca9653b94881e57c396d303991410eb1dd4a60258a20844c949aec6d'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ee77d35586eb2757c3c590d8dcf03b159a66210dcc6994c39632e32e1eef0467', 'txt_hash': '97e6011301e891594070c28619a2477efa80d8809d56f1bef620b2e8e6b7fb55'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}
. - The following properties were deleted:
['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash']
.
The PDF extraction data was updated.
- The following values were inserted:
{'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}
. - The report_frontpage property was set to
{}
. - The st_frontpage property was set to
None
.
- The following values were inserted:
-
04.01.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'annotated_references': None}
.
- The following values were inserted:
-
26.04.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'scheme_data': None}
.
- The following values were inserted:
-
11.02.2023 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.cc.CCCertificate
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.InternalState
. - The following properties were deleted:
['errors']
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.PdfData
.
The computed heuristics were updated.
- The following values were inserted:
{'direct_transitive_cves': None, 'indirect_transitive_cves': None}
. - The _type property was set to
sec_certs.sample.cc.CCCertificate.Heuristics
. - The following properties were deleted:
['direct_dependency_cves', 'indirect_dependency_cves']
.
- The new value is
-
05.02.2023 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
ee77d35586eb2757c3c590d8dcf03b159a66210dcc6994c39632e32e1eef0467
. - The st_txt_hash property was set to
97e6011301e891594070c28619a2477efa80d8809d56f1bef620b2e8e6b7fb55
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 249441, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 45, '/Producer': 'GNU Ghostscript 7.05', '/Title': 'Untitled Document', '/Creator': 'Windows NT 4.0', '/CreationDate': 'D:00000101000000Z', '/ModDate': 'D:20040227102437Z', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL2': 3}}, 'cc_sar': {'ACM': {'ACM_CAP.2': 2}, 'ADO': {'ADO_DEL.1': 2, 'ADO_IGS.1': 2}, 'ADV': {'ADV_FSP.1': 2, 'ADV_HLD.1': 2, 'ADV_RCR.1': 2}, 'AGD': {'AGD_ADM.1': 2, 'AGD_USR.1': 2}, 'ATE': {'ATE_COV.1': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_SOF.1': 2, 'AVA_VLA.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 14, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2': 7, 'FAU_SAR.1': 8, 'FAU_SAR.2': 7, 'FAU_SAR.3': 10, 'FAU_STG.1': 10, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FDP': {'FDP_ACC.1': 8, 'FDP_ACF.1': 10, 'FDP_RIP.2': 8, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_RIP.2.1': 1, 'FDP_RIP.3': 6, 'FDP_RIP.3.1': 1, 'FDP_RIP': 1}, 'FIA': {'FIA_ATD.1': 11, 'FIA_SOS.1': 13, 'FIA_UAU.2': 14, 'FIA_UAU.7': 6, 'FIA_UID.2': 11, 'FIA_USB.1': 15, 'FIA_ATD.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.2.1': 1, 'FIA_USB.1.1': 1, 'FIA_UID.1': 2, 'FIA_UAU.1': 2, 'FIA_USB': 1}, 'FMT': {'FMT_MSA.1': 10, 'FMT_MSA.3': 7, 'FMT_MTD.1': 36, 'FMT_REV.1': 20, 'FMT_SMF.1': 20, 'FMT_SMR.1': 16, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 5, 'FMT_REV.1.1': 2, 'FMT_REV.1.2': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_AMT.1': 6, 'FPT_RVM.1': 9, 'FPT_SEP.1': 7, 'FPT_STM.1': 8, 'FPT_AMT.1.1': 1, 'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_STM.1.1': 1}}, 'cc_claims': {'O': {'O.AUTHORIZATION': 11, 'O.DISCRETIONARY_ACCESS': 12, 'O.AUDITING': 15, 'O.RESIDUAL_INFORMATION': 6, 'O.MANAGE': 15, 'O.ENFORCEMENT': 11, 'O.INSTALL': 2, 'O.PHYSICAL': 2, 'O.CREDEN': 2}, 'A': {'A.LOCATE': 3, 'A.PROTECT': 2, 'A.MANAGE': 3, 'A.NO_EVIL_ADM': 2, 'A.COOP': 3, 'A.PEER': 3, 'A.CONNECT': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
Linux_v1.7.pdf
.
The computed heuristics were updated.
- The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 1}]}
.
- The st_download_ok property was set to
-
26.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/CRP200.pdf, code: nok', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/Linux_v1.7.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was set to
None
.
- The st_download_ok property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0402-2008']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0402-2008']}}
data.
- The st_references property was updated, with the
-
24.12.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None}
data.
- The st_references property was updated, with the
-
23.12.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0402-2008']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0402-2008']}}
data.
- The st_references property was updated, with the
-
23.12.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None}
data.
- The st_references property was updated, with the
-
05.10.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'st_convert_garbage': False, 'report_convert_garbage': False}
.
- The following values were inserted:
-
24.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The following values were inserted:
{'report_filename': 'CRP200.pdf', 'st_filename': 'Linux_v1.7.pdf'}
. - The report_keywords property was updated, with the
{'cc_security_level': {'__update__': {'EAL': {'__insert__': {'EAL7': 1}, '__update__': {'EAL2': 16}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'covered only the command line interface of Red Hat Enterprise Linux. Graphical interfaces were out of scope of the evaluation. 2. Each platform under test was connected via a hub to a platform running Red': 1}, '__delete__': ['. Graphical interfaces were out of scope of the evaluation', 'ting covered only the command line interface of Red Hat Enterprise Linux. Graphical interfaces were out of scope of the evaluation. 2. Each platform under test was connected via a hub to a platform running Red']}}}}
data. - The st_keywords property was updated, with the
{'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL2': 3}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_SAR.1': 8}}, 'FDP': {'__update__': {'FDP_ACF.1': 10}}, 'FIA': {'__update__': {'FIA_UAU.2': 14, 'FIA_UID.1': 2, 'FIA_UAU.1': 2}, '__delete__': ['FIA_SOS.1.1']}, 'FMT': {'__update__': {'FMT_MSA.3': 7, 'FMT_MTD.1': 36, 'FMT_SMF.1': 20, 'FMT_SMR.1': 16}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.RESIDUAL_INFORMATION': 6, 'O.MANAGE': 15, 'O.ENFORCEMENT': 11}}, 'A': {'__update__': {'A.PROTECT': 2, 'A.NO_EVIL_ADM': 2}}}, '__delete__': ['OE']}, 'vendor': {}}
data.
The computed heuristics were updated.
- The cert_id property was set to
CRP200
. - The st_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0402-2008']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0402-2008']}}
data.
- The following values were inserted:
-
18.07.2022 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.common_criteria.CommonCriteriaCert
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData
.
The computed heuristics were updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics
. - The st_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The report_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 1}]}
.
- The new value is
-
17.07.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
values inserted. - The st_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
values inserted. - The report_keywords property was set to
{'cc_cert_id': {'UK': {'CERTIFICATION REPORT No. P200': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 30, 'EAL1': 1}}, 'cc_sar': {}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 1}, 'FDP': {'FDP_RIP.3': 1, 'FDP_RIP.2': 1}, 'FIA': {'FIA_USB.1': 1}}, 'cc_claims': {}, 'vendor': {'Broadcom': {'Broadcom': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCIMB-99-031': 1, 'CCIMB-99-032': 1, 'CCIMB-99-033': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, '. Graphical interfaces were out of scope of the evaluation': 1, 'ting covered only the command line interface of Red Hat Enterprise Linux. Graphical interfaces were out of scope of the evaluation. 2. Each platform under test was connected via a hub to a platform running Red': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL2': 2}}, 'cc_sar': {'ACM': {'ACM_CAP.2': 2}, 'ADO': {'ADO_DEL.1': 2, 'ADO_IGS.1': 2}, 'ADV': {'ADV_FSP.1': 2, 'ADV_HLD.1': 2, 'ADV_RCR.1': 2}, 'AGD': {'AGD_ADM.1': 2, 'AGD_USR.1': 2}, 'ATE': {'ATE_COV.1': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_SOF.1': 2, 'AVA_VLA.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 14, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2': 7, 'FAU_SAR.1': 9, 'FAU_SAR.2': 7, 'FAU_SAR.3': 10, 'FAU_STG.1': 10, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FDP': {'FDP_ACC.1': 8, 'FDP_ACF.1': 11, 'FDP_RIP.2': 8, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_RIP.2.1': 1, 'FDP_RIP.3': 6, 'FDP_RIP.3.1': 1, 'FDP_RIP': 1}, 'FIA': {'FIA_ATD.1': 11, 'FIA_SOS.1': 13, 'FIA_UAU.2': 15, 'FIA_UAU.7': 6, 'FIA_UID.2': 11, 'FIA_USB.1': 15, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.2.1': 1, 'FIA_USB.1.1': 1, 'FIA_UID.1': 1, 'FIA_UAU.1': 1, 'FIA_USB': 1}, 'FMT': {'FMT_MSA.1': 10, 'FMT_MSA.3': 8, 'FMT_MTD.1': 35, 'FMT_REV.1': 20, 'FMT_SMF.1': 21, 'FMT_SMR.1': 17, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 5, 'FMT_REV.1.1': 2, 'FMT_REV.1.2': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_AMT.1': 6, 'FPT_RVM.1': 9, 'FPT_SEP.1': 7, 'FPT_STM.1': 8, 'FPT_AMT.1.1': 1, 'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_STM.1.1': 1}}, 'cc_claims': {'O': {'O.AUTHORIZATION': 11, 'O.DISCRETIONARY_ACCESS': 12, 'O.AUDITING': 15, 'O.RESIDUAL_INFORMATION': 7, 'O.MANAGE': 17, 'O.ENFORCEMENT': 12, 'O.INSTALL': 2, 'O.PHYSICAL': 2, 'O.CREDEN': 2}, 'A': {'A.LOCATE': 3, 'A.PROTECT': 3, 'A.MANAGE': 3, 'A.NO_EVIL_ADM': 3, 'A.COOP': 3, 'A.PEER': 3, 'A.CONNECT': 3}, 'OE': {'OE': 1}}, 'vendor': {'STMicroelectronics': {'STM': 9}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
.
The computed heuristics were updated.
- The _type property was set to
Heuristics
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 2}, {'_type': 'SAR', 'family': 'ADO_DEL', 'level': 1}]}
values discarded.
- The report_metadata property was updated, with the
-
14.06.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report_pdf_hash': 'e39133eecf44e09b956f806bed73ccb47af20cc34bd152113731ffd2a533fff3', 'st_pdf_hash': 'ee77d35586eb2757c3c590d8dcf03b159a66210dcc6994c39632e32e1eef0467', 'report_txt_hash': 'b0cab3e6ca9653b94881e57c396d303991410eb1dd4a60258a20844c949aec6d', 'st_txt_hash': '97e6011301e891594070c28619a2477efa80d8809d56f1bef620b2e8e6b7fb55'}
.
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'rules_vendor': {'Broadcom': 1}}
data. - The st_keywords property was updated, with the
{'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {'MD5': 2}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}}
values inserted.
- The following values were inserted:
-
13.05.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADO_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_HLD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}]}}
.
- The following values were inserted:
-
24.04.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'direct_dependency_cves': None, 'indirect_dependency_cves': None}
.
- The following values were inserted:
-
08.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}
. - The following properties were deleted:
['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting']
.
- The following values were inserted:
-
18.02.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted. - The st_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted.
The computed heuristics were updated.
- The extracted_versions property was set to
{'_type': 'Set', 'elements': ['3']}
.
- The report_frontpage property was updated, with the
-
28.01.2022 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Red Hat Enterprise Linux 3 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Operating Systems",
"cert_link": null,
"dgst": "6b7414782c7e6e7c",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CRP200",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"3"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0402-2008"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0402-2008"
]
},
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Oracle Corporation",
"manufacturer_web": "https://www.oracle.com",
"name": "Red Hat Enterprise Linux 3",
"not_valid_after": "2013-03-05",
"not_valid_before": "2004-02-01",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "CRP200.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"UK": {
"CERTIFICATION REPORT No. P200": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL1": 1,
"EAL2": 16,
"EAL7": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 1
},
"FDP": {
"FDP_RIP.2": 1,
"FDP_RIP.3": 1
},
"FIA": {
"FIA_USB.1": 1
}
},
"certification_process": {
"OutOfScope": {
"covered only the command line interface of Red Hat Enterprise Linux. Graphical interfaces were out of scope of the evaluation. 2. Each platform under test was connected via a hub to a platform running Red": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCIMB-99-031": 1,
"CCIMB-99-032": 1,
"CCIMB-99-033": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Broadcom": {
"Broadcom": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "racook",
"/CreationDate": "D:20040227102521Z",
"/Creator": "LFS_T445_Linux_CertRep_P200_10final - Microsoft Word",
"/ModDate": "D:20131119171508Z",
"/Producer": "Acrobat PDFWriter 5.0 for Windows NT",
"/Title": "LFS_T445_Linux_CertRep_P200_10final.doc",
"pdf_file_size_bytes": 104109,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 28
},
"st_filename": "Linux_v1.7.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONNECT": 3,
"A.COOP": 3,
"A.LOCATE": 3,
"A.MANAGE": 3,
"A.NO_EVIL_ADM": 2,
"A.PEER": 3,
"A.PROTECT": 2
},
"O": {
"O.AUDITING": 15,
"O.AUTHORIZATION": 11,
"O.CREDEN": 2,
"O.DISCRETIONARY_ACCESS": 12,
"O.ENFORCEMENT": 11,
"O.INSTALL": 2,
"O.MANAGE": 15,
"O.PHYSICAL": 2,
"O.RESIDUAL_INFORMATION": 6
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_CAP.2": 2
},
"ADO": {
"ADO_DEL.1": 2,
"ADO_IGS.1": 2
},
"ADV": {
"ADV_FSP.1": 2,
"ADV_HLD.1": 2,
"ADV_RCR.1": 2
},
"AGD": {
"AGD_ADM.1": 2,
"AGD_USR.1": 2
},
"ATE": {
"ATE_COV.1": 2,
"ATE_FUN.1": 2,
"ATE_IND.2": 2
},
"AVA": {
"AVA_SOF.1": 2,
"AVA_VLA.1": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL2": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 14,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 7,
"FAU_GEN.2.1": 1,
"FAU_SAR.1": 8,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 7,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 10,
"FAU_SAR.3.1": 1,
"FAU_STG.1": 10,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1
},
"FDP": {
"FDP_ACC.1": 8,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 10,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_RIP": 1,
"FDP_RIP.2": 8,
"FDP_RIP.2.1": 1,
"FDP_RIP.3": 6,
"FDP_RIP.3.1": 1
},
"FIA": {
"FIA_ATD.1": 11,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 13,
"FIA_UAU.1": 2,
"FIA_UAU.2": 14,
"FIA_UAU.2.1": 1,
"FIA_UAU.7": 6,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 2,
"FIA_UID.2": 11,
"FIA_UID.2.1": 1,
"FIA_USB": 1,
"FIA_USB.1": 15,
"FIA_USB.1.1": 1
},
"FMT": {
"FMT_MSA.1": 10,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 7,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 36,
"FMT_MTD.1.1": 5,
"FMT_REV.1": 20,
"FMT_REV.1.1": 2,
"FMT_REV.1.2": 2,
"FMT_SMF.1": 20,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 16,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_AMT.1": 6,
"FPT_AMT.1.1": 1,
"FPT_RVM.1": 9,
"FPT_RVM.1.1": 1,
"FPT_SEP.1": 7,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1,
"FPT_STM.1": 8,
"FPT_STM.1.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:00000101000000Z",
"/Creator": "Windows NT 4.0",
"/ModDate": "D:20040227102437Z",
"/Producer": "GNU Ghostscript 7.05",
"/Title": "Untitled Document",
"pdf_file_size_bytes": 249441,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 45
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/CRP200.pdf",
"scheme": "UK",
"security_level": {
"_type": "Set",
"elements": [
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/Linux_v1.7.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e39133eecf44e09b956f806bed73ccb47af20cc34bd152113731ffd2a533fff3",
"txt_hash": "b0cab3e6ca9653b94881e57c396d303991410eb1dd4a60258a20844c949aec6d"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ee77d35586eb2757c3c590d8dcf03b159a66210dcc6994c39632e32e1eef0467",
"txt_hash": "97e6011301e891594070c28619a2477efa80d8809d56f1bef620b2e8e6b7fb55"
}
},
"status": "archived"
}