SUSE Linux Enterprise Server 8 with service pack 3

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status archived
Valid from 23.09.2004
Valid until 01.09.2019
Scheme 🇩🇪 DE
Manufacturer SUSE Linux Products Gmbh
Category Operating Systems
Security level ALC_FLR.3, EAL3+

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0270-2004

Certificate ?

Certification report ?

Extracted keywords

Protocols
SSH, SSL

Security level
EAL3, EAL 1, EAL 7, EAL 4, EAL3+, EAL1, EAL5, EAL7, EAL2, EAL4, EAL6, EAL3 augmented
Claims
T.UAUSER, T.UAACCESS, T.COMPROT, A.LOCATE, A.PROTECT, A.MANAGE, A.NO_EVIL_ADMIN, A.COOP, A.UTRAIN, A.UTRUST, A.NET_COMP, A.PEER, A.CONNECT, OE.CREDEN, OE.INSTALL, OE.INFO_PROTECT, OE.MAINTENANCE, OE.RECOVER, OE.SOFTWARE_IN, OE.SERIAL_LOGIN, OE.HW_SEP
Security Assurance Requirements (SAR)
ACM_CAP.3, ACM_SCP.1, ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL.1, ADO_IGS.1, ADO_DEL, ADO_IGS, ADV_FSP.1, ADV_HLD.2, ADV_RCR.1, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_FLR.3, ALC_DVS.1, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.1, AVA_SOF.1, AVA_VLA.1, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, AVA_VLA.2, AVA_VLA.3, AVA_VLA.4, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_SEL.1, FAU_STG.1, FAU_STG.3, FAU_STG.4, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.2, FDP_UCT.1, FDP_UIT.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.7, FIA_USB.1, FIA_UAU.2, FIA_UID.2, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_REV.1, FMT_SMR.1, FMT_SMF, FMT_MSA.2, FPT_AMT.1, FPT_RVM.1, FPT_SEP.1, FPT_STM.1, FTP_ITC.1
Certificates
BSI-DSZ-CC-0270-2004, BSI-DSZ-CC-0234-2004, BSI-DSZ-CC-0270
Evaluation facilities
atsec

Side-channel analysis
malfunction
Certification process
Technical Report BSI-DSZ-CC-0270, Version 1.1, 2004-09- 21, atsec Information Security GmbH (confidential document) [9] Controlled Access Protection Profile (CAPP), Version 1.d National Security Agency, 1999-10-08

Standards
AIS 32, AIS32, AIS33, ISO/IEC 15408:1999
Technical reports
BSI 7125, BSI 7148, BSI 7149

File metadata

Title certification report 0270
Subject SUSE Linux Enterprise Server V8
Keywords Linux SUSE
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20041021120604Z
Modification date D:20041027105841+02'00'
Pages 57
Creator Microsoft Word - 0270_Report_CC_engl-Vorlage V203_final.doc
Producer Acrobat PDFWriter 4.0 für Windows NT

Frontpage

Certificate ID BSI-DSZ-CC-0270-2004
Certified item SuSE Linux Enterprise Server V8 Service Pack 3 with certification-sles-hp-eal3 package
Certification lab BSI
Developer SUSE LINUX AG sponsored by Hewlett Packard Company

References

Outgoing
  • BSI-DSZ-CC-0234-2004 - archived - SuSE Linux Enterprise Server V8, Service Pack 3, RC4, with certification-sles-eal3 package

Security target ?

Extracted keywords

Symmetric Algorithms
RC4, DES, TDES, SM4
Asymmetric Algorithms
Diffie-Hellman
Hash functions
SHA-1, MD5
Protocols
SSH, SSL
Libraries
OpenSSL
Block cipher modes
CBC

JavaCard API constants
SM2

Security level
EAL3, EAL 3, EAL3 augmented, EAL 3 augmented
Claims
O.AUTHORIZATION, O.DISCRETIONARY_ACCESS, O.AUDITING, O.RESIDUAL_INFO, O.MANAGE, O.ENFORCEMENT, O.COMPROT, O.MANAG, O.RESIDUAL_INFORMATION, T.UAUSER, T.UAACCESS, T.COMPROT, A.LOCATE, A.PROTECT, A.MANAGE, A.NO_EVIL_ADMIN, A.COOP, A.UTRAIN, A.UTRUST, A.NET_COMP, A.PEER, A.CONNECT, OE.ADMIN, OE.CREDEN, OE.INSTALL, OE.PHYSICAL, OE.INFO_PROTECT, OE.MAINTENANCE, OE.RECOVER, OE.SOFTWARE_IN, OE.SERIAL_LOGIN, OE.HW_SEP, OE.PROTECT, OE.INSTAL
Security Assurance Requirements (SAR)
ACM_CAP.3, ACM_SCP.1, ADO_DEL.1, ADO_IGS.1, ADV_FSP.1, ADV_HLD.2, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.3, ALC_DVS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_SOF.1, AVA_MSU.1, AVA_VLA.1, ASE_REQ.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_SEL.1, FAU_STG.2, FAU_STG.3, FAU_STG.4, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FAU_STG.4.1, FAU_STG, FAU_SEL, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_COP.1.1, FCS_CKM.4, FDP_UCT.1, FDP_UIT.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.2.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_MSA.3, FDP_ACF.2, FDP_ITC.1, FDP_IFC.1, FIA_ATD.1, FIA_UID, FIA_SOS.1, FIA_UAU.2, FIA_UAU.7, FIA_UID.2, FIA_USB.1, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UAU.7.1, FIA_UID.2.1, FIA_USB.1.1, FIA_UAU.1, FIA_UID.1, FIA_USB, FMT_SMF.1, FMT_MSA.2, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_REV.1, FMT_SMR.1, FMT_MOF.1, FMT_MSA.1.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF, FPT_AMT.1, FPT_RVM.1, FPT_SEP.1, FPT_STM.1, FPT_AMT.1.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_STM.1.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1
Evaluation facilities
atsec

Side-channel analysis
malfunction

Standards
PKCS#1, AIS137, AIS 32, RFC2104, X.509, CCIMB-99-031

File metadata

Title HP_SLES_security_target_eal3_nocb_v1.5.doc
Author afx
Creation date D:20041027112011
Pages 90
Creator HP_SLES_security_target_eal3_nocb_v1.5.doc - Microsoft Word
Producer Acrobat PDFWriter 5.0 for Windows NT

Heuristics ?

Certificate ID: BSI-DSZ-CC-0270-2004

Extracted SARs

ADV_FSP.1, ADV_HLD.2, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_FLR.3, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.1, AVA_SOF.1, AVA_VLA.1

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2000-0218
C M N
HIGH 7.2 10.0 03.02.2000 05:00
CVE-2000-0361
C M N
LOW 2.1 2.9 14.12.1999 05:00
CVE-2002-0762
C M N
HIGH 7.2 10.0 12.08.2002 04:00
CVE-2002-0768
C M N
HIGH 7.5 6.4 12.08.2002 04:00
CVE-2002-0854
C M N
HIGH 7.2 10.0 05.09.2002 04:00
CVE-2002-1285
C M N
HIGH 7.2 10.0 29.11.2002 05:00
CVE-2003-1538
C M N
MEDIUM 6.4 4.9 31.12.2003 05:00
CVE-2004-0460
C M N
HIGH 10.0 10.0 06.08.2004 04:00
CVE-2004-0461
C M N
HIGH 10.0 10.0 06.08.2004 04:00
CVE-2004-0495
C M N
HIGH 7.2 10.0 06.08.2004 04:00
CVE-2004-0497
C M N
LOW 2.1 2.9 06.12.2004 05:00
CVE-2004-0535
C M N
LOW 2.1 2.9 06.08.2004 04:00
CVE-2004-0554
C M N
LOW 2.1 2.9 06.08.2004 04:00
CVE-2004-0587
C M N
LOW 2.1 2.9 06.08.2004 04:00
CVE-2004-0626
C M N
MEDIUM 5.0 2.9 06.12.2004 05:00
CVE-2004-0687
C M N
HIGH 7.5 6.4 20.10.2004 04:00
CVE-2004-0688
C M N
HIGH 7.5 6.4 20.10.2004 04:00
CVE-2004-0746
C M N
HIGH 7.5 6.4 20.10.2004 04:00
CVE-2004-0802
C M N
MEDIUM 5.1 6.4 31.12.2004 05:00
CVE-2004-0803
C M N
HIGH 7.5 6.4 23.12.2004 05:00
CVE-2004-0807
C M N
MEDIUM 5.0 2.9 13.09.2004 04:00
CVE-2004-0817
C M N
HIGH 7.5 6.4 31.12.2004 05:00
CVE-2004-0827
C M N
HIGH 7.5 6.4 16.09.2004 04:00
CVE-2004-0866
C M N
HIGH 7.5 6.4 16.09.2004 04:00
CVE-2004-0867
C M N
HIGH 7.5 6.4 23.12.2004 05:00
CVE-2004-0883
C M N
MEDIUM 6.4 4.9 10.01.2005 05:00
CVE-2004-0886
C M N
MEDIUM 5.0 2.9 27.01.2005 05:00
CVE-2004-0888
C M N
HIGH 10.0 10.0 27.01.2005 05:00
CVE-2004-0889
C M N
HIGH 10.0 10.0 27.01.2005 05:00
CVE-2004-0902
C M N
HIGH 10.0 10.0 27.01.2005 05:00
CVE-2004-0903
C M N
HIGH 10.0 10.0 27.01.2005 05:00
CVE-2004-0905
C M N
MEDIUM 4.6 6.4 14.09.2004 04:00
CVE-2004-0914
C M N
HIGH 10.0 10.0 10.01.2005 05:00
CVE-2004-0929
C M N
HIGH 10.0 10.0 27.01.2005 05:00
CVE-2004-0940
C M N
HIGH 7.8 5.9 09.02.2005 05:00
CVE-2004-0949
C M N
MEDIUM 6.4 4.9 10.01.2005 05:00
CVE-2004-0956
C M N
MEDIUM 5.0 2.9 10.01.2005 05:00
CVE-2004-0957
C M N
MEDIUM 6.8 6.4 09.02.2005 05:00
CVE-2004-0981
C M N
HIGH 10.0 10.0 09.02.2005 05:00
CVE-2004-0990
C M N
HIGH 10.0 10.0 01.03.2005 05:00
CVE-2004-0991
C M N
HIGH 7.5 6.4 11.01.2005 05:00
CVE-2004-1004
C M N
HIGH 7.5 6.4 14.04.2005 04:00
CVE-2004-1005
C M N
HIGH 7.5 6.4 14.04.2005 04:00
CVE-2004-1009
C M N
MEDIUM 5.0 2.9 14.04.2005 04:00
CVE-2004-1070
C M N
HIGH 7.2 10.0 10.01.2005 05:00
CVE-2004-1071
C M N
HIGH 7.2 10.0 10.01.2005 05:00
CVE-2004-1072
C M N
HIGH 7.2 10.0 10.01.2005 05:00
CVE-2004-1073
C M N
LOW 2.1 2.9 10.01.2005 05:00
CVE-2004-1074
C M N
LOW 2.1 2.9 10.01.2005 05:00
CVE-2004-1090
C M N
MEDIUM 5.0 2.9 14.04.2005 04:00
CVE-2004-1091
C M N
MEDIUM 5.0 2.9 14.04.2005 04:00
CVE-2004-1092
C M N
MEDIUM 5.0 2.9 14.04.2005 04:00
CVE-2004-1093
C M N
MEDIUM 5.0 2.9 14.04.2005 04:00
CVE-2004-1098
C M N
HIGH 7.5 6.4 10.01.2005 05:00
CVE-2004-1139
C M N
MEDIUM 5.0 2.9 15.12.2004 05:00
CVE-2004-1142
C M N
MEDIUM 5.0 2.9 15.12.2004 05:00
CVE-2004-1145
C M N
MEDIUM 5.0 2.9 15.12.2004 05:00
CVE-2004-1154
C M N
HIGH 10.0 10.0 10.01.2005 05:00
CVE-2004-1170
C M N
HIGH 10.0 10.0 10.01.2005 05:00
CVE-2004-1174
C M N
MEDIUM 5.0 2.9 14.04.2005 04:00
CVE-2004-1175
C M N
HIGH 7.5 6.4 14.04.2005 04:00
CVE-2004-1176
C M N
HIGH 7.5 6.4 14.04.2005 04:00
CVE-2004-1184
C M N
MEDIUM 4.6 6.4 21.01.2005 05:00
CVE-2004-1190
C M N
LOW 2.1 2.9 10.01.2005 05:00
CVE-2004-1191
C M N
LOW 1.2 2.9 10.01.2005 05:00
CVE-2004-1235
C M N
MEDIUM 6.2 10.0 14.04.2005 04:00
CVE-2004-1237
C M N
LOW 2.1 2.9 14.04.2005 04:00
CVE-2004-1476
C M N
MEDIUM 5.1 6.4 31.12.2004 05:00
CVE-2004-1491
C M N
MEDIUM 5.0 2.9 31.12.2004 05:00
CVE-2004-1895
C M N
LOW 2.1 2.9 31.12.2004 05:00
CVE-2005-0005
C M N
HIGH 7.5 6.4 02.05.2005 04:00
CVE-2005-0085
C M N
MEDIUM 6.8 6.4 27.04.2005 04:00
CVE-2005-0156
C M N
LOW 2.1 2.9 07.02.2005 05:00
CVE-2005-0206
C M N
HIGH 7.5 6.4 27.04.2005 04:00
CVE-2005-0207
C M N
LOW 2.1 2.9 02.05.2005 04:00
CVE-2005-0337
C M N
HIGH 7.5 6.4 02.05.2005 04:00
CVE-2005-0373
C M N
HIGH 7.5 6.4 07.10.2004 04:00
CVE-2005-0384
C M N
MEDIUM 5.0 2.9 15.03.2005 05:00
CVE-2005-0605
C M N
HIGH 7.5 6.4 02.03.2005 05:00
CVE-2005-0638
C M N
HIGH 7.5 6.4 02.03.2005 05:00
CVE-2005-0639
C M N
HIGH 7.5 6.4 02.03.2005 05:00
CVE-2005-1043
C M N
MEDIUM 5.0 2.9 14.04.2005 04:00
CVE-2005-3146
C M N
LOW 2.1 2.9 05.10.2005 21:02
CVE-2005-3147
C M N
LOW 2.1 2.9 05.10.2005 21:02
CVE-2005-3148
C M N
MEDIUM 4.6 6.4 05.10.2005 21:02
CVE-2007-0460
C M N
HIGH 10.0 10.0 24.01.2007 01:28
CVE-2007-1285
C M N
HIGH 7.5 3.6 06.03.2007 20:19
CVE-2007-4074
C M N
HIGH 10.0 10.0 30.07.2007 17:30
CVE-2007-4393
C M N
MEDIUM 4.6 6.4 17.08.2007 22:17
CVE-2007-6167
C M N
HIGH 7.2 10.0 29.11.2007 01:46
CVE-2007-6427
C M N
HIGH 9.3 10.0 18.01.2008 23:00
CVE-2008-3949
C M N
HIGH 7.2 10.0 22.09.2008 18:52
CVE-2009-3620
C M N
HIGH 7.8 5.9 22.10.2009 16:00
Showing 5 out of 93.

Similar certificates

Name Certificate ID
SUSE Linux Enterprise Server 8 with service pack 3 to CC EAL 3+ BSI-DSZ-CC-0327-2005 Compare
SUSE Linux Enterprise Server V 8 with Service Pack 3 BSI-DSZ-CC-0371-2006 Compare

References ?

Updates ?

  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cpe_matches property was updated, with the {'_type': 'Set', 'elements': ['cpe:2.3:o:suse:suse_linux:3.0:*:*:*:*:*:*:*']} values added.
    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2004-0687', 'CVE-2004-0587', 'CVE-2002-1285', 'CVE-2004-0817', 'CVE-2002-0854', 'CVE-2007-0460', 'CVE-2000-0361', 'CVE-2004-0495', 'CVE-2004-0461', 'CVE-2004-0803', 'CVE-2004-1145', 'CVE-2004-0867', 'CVE-2007-4393', 'CVE-2004-1139', 'CVE-2004-0535', 'CVE-2002-0762', 'CVE-2004-1895', 'CVE-2007-1285', 'CVE-2004-1476', 'CVE-2004-0866', 'CVE-2004-0460', 'CVE-2004-1491', 'CVE-2007-4074', 'CVE-2004-0827', 'CVE-2004-1142', 'CVE-2002-0768', 'CVE-2004-0554', 'CVE-2004-0746', 'CVE-2005-0373', 'CVE-2004-0905', 'CVE-2004-0802', 'CVE-2004-0626', 'CVE-2004-0807', 'CVE-2000-0218', 'CVE-2003-1538', 'CVE-2004-0497', 'CVE-2004-0688']} values added.
  • 30.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The related_cves property was updated, with the {'_type': 'Set', 'elements': ['CVE-2009-3620']} values added.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '71a688e59e4e3f3d68e9af9c116d34162815cfc610b8fbd67ec4812ebdd5d942', 'txt_hash': 'f881347196d01d3bae39f9a6c12476566f648d61af4b864e67afb68e396416a6'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b46035e4d1f461e49a459ff23588ed2ae775c83549b8eaa1cbceddb31ab835a8', 'txt_hash': '4c8441c7f70ef89eaec8005142ca9821787e44eda021bcc6048b1a426e9723ce'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 269860, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 57, '/Creator': 'Microsoft Word - 0270_Report_CC_engl-Vorlage V203_final.doc', '/CreationDate': 'D:20041021120604Z', '/Title': 'certification report 0270', '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/Producer': 'Acrobat PDFWriter 4.0 für Windows NT', '/Subject': 'SUSE Linux Enterprise Server V8', '/Keywords': 'Linux SUSE', '/ModDate': "D:20041027105841+02'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 333501, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 90, '/Creator': 'HP_SLES_security_target_eal3_nocb_v1.5.doc - Microsoft Word', '/CreationDate': 'D:20041027112011', '/Title': 'HP_SLES_security_target_eal3_nocb_v1.5.doc', '/Author': 'afx', '/Producer': 'Acrobat PDFWriter 5.0 for Windows NT', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0270-2004', 'cert_item': 'SuSE Linux Enterprise Server V8 Service Pack 3 with certification-sles-hp-eal3 package', 'developer': 'SUSE LINUX AG sponsored by Hewlett Packard Company', 'cert_lab': 'BSI'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0270-2004': 28, 'BSI-DSZ-CC-0234-2004': 2, 'BSI-DSZ-CC-0270': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 6, 'EAL 1': 1, 'EAL 7': 1, 'EAL 4': 1, 'EAL3+': 4, 'EAL1': 5, 'EAL5': 6, 'EAL7': 4, 'EAL2': 3, 'EAL4': 4, 'EAL6': 3, 'EAL3 augmented': 2}}, 'cc_sar': {'ACM': {'ACM_CAP.3': 1, 'ACM_SCP.1': 1, 'ACM_AUT': 2, 'ACM_CAP': 2, 'ACM_SCP': 2}, 'ADO': {'ADO_DEL.1': 1, 'ADO_IGS.1': 1, 'ADO_DEL': 2, 'ADO_IGS': 2}, 'ADV': {'ADV_FSP.1': 1, 'ADV_HLD.2': 1, 'ADV_RCR.1': 1, 'ADV_FSP': 2, 'ADV_HLD': 2, 'ADV_IMP': 2, 'ADV_INT': 2, 'ADV_LLD': 2, 'ADV_RCR': 2, 'ADV_SPM': 2}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1, 'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_FLR.3': 5, 'ALC_DVS.1': 1, 'ALC_DVS': 2, 'ALC_FLR': 2, 'ALC_LCD': 1, 'ALC_TAT': 2}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_COV': 2, 'ATE_DPT': 2, 'ATE_FUN': 2, 'ATE_IND': 2}, 'AVA': {'AVA_MSU.1': 1, 'AVA_SOF.1': 1, 'AVA_VLA.1': 1, 'AVA_CCA': 2, 'AVA_MSU': 2, 'AVA_SOF': 4, 'AVA_VLA': 4, 'AVA_VLA.2': 1, 'AVA_VLA.3': 1, 'AVA_VLA.4': 1}, 'ASE': {'ASE_DES.1': 1, 'ASE_ENV.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.1': 1, 'ASE_PPC.1': 1, 'ASE_REQ.1': 1, 'ASE_SRE.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 1, 'FAU_GEN.2': 1, 'FAU_SAR.1': 1, 'FAU_SAR.2': 1, 'FAU_SAR.3': 1, 'FAU_SEL.1': 1, 'FAU_STG.1': 1, 'FAU_STG.3': 1, 'FAU_STG.4': 1}, 'FCS': {'FCS_CKM.1': 1, 'FCS_CKM.2': 1, 'FCS_COP.1': 1}, 'FDP': {'FDP_ACC.1': 1, 'FDP_ACF.1': 1, 'FDP_RIP.2': 1, 'FDP_UCT.1': 1, 'FDP_UIT.1': 1}, 'FIA': {'FIA_ATD.1': 1, 'FIA_SOS.1': 1, 'FIA_UAU.7': 1, 'FIA_USB.1': 1, 'FIA_UAU.2': 1, 'FIA_UID.2': 1}, 'FMT': {'FMT_MSA.1': 1, 'FMT_MSA.3': 1, 'FMT_MTD.1': 1, 'FMT_REV.1': 1, 'FMT_SMR.1': 1, 'FMT_SMF': 1, 'FMT_MSA.2': 1}, 'FPT': {'FPT_AMT.1': 1, 'FPT_RVM.1': 1, 'FPT_SEP.1': 1, 'FPT_STM.1': 1}, 'FTP': {'FTP_ITC.1': 1}}, 'cc_claims': {'T': {'T.UAUSER': 1, 'T.UAACCESS': 1, 'T.COMPROT': 1}, 'A': {'A.LOCATE': 2, 'A.PROTECT': 2, 'A.MANAGE': 2, 'A.NO_EVIL_ADMIN': 2, 'A.COOP': 2, 'A.UTRAIN': 2, 'A.UTRUST': 2, 'A.NET_COMP': 2, 'A.PEER': 2, 'A.CONNECT': 2}, 'OE': {'OE.CREDEN': 1, 'OE.INSTALL': 1, 'OE.INFO_PROTECT': 1, 'OE.MAINTENANCE': 1, 'OE.RECOVER': 1, 'OE.SOFTWARE_IN': 1, 'OE.SERIAL_LOGIN': 1, 'OE.HW_SEP': 1}}, 'vendor': {}, 'eval_facility': {'atsec': {'atsec': 5}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 7}, 'TLS': {'SSL': {'SSL': 7}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 1}}, 'technical_report_id': {'BSI': {'BSI 7125': 2, 'BSI 7148': 1, 'BSI 7149': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 32': 1, 'AIS32': 1, 'AIS33': 1}, 'ISO': {'ISO/IEC 15408:1999': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'Technical Report BSI-DSZ-CC-0270, Version 1.1, 2004-09- 21, atsec Information Security GmbH (confidential document) [9] Controlled Access Protection Profile (CAPP), Version 1.d National Security Agency, 1999-10-08': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 11, 'EAL 3': 1, 'EAL3 augmented': 3, 'EAL 3 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_CAP.3': 1, 'ACM_SCP.1': 1}, 'ADO': {'ADO_DEL.1': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_FSP.1': 1, 'ADV_HLD.2': 1, 'ADV_RCR.1': 1}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1}, 'ALC': {'ALC_FLR.3': 9, 'ALC_DVS.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_SOF.1': 2, 'AVA_MSU.1': 1, 'AVA_VLA.1': 1}, 'ASE': {'ASE_REQ.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 13, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2': 9, 'FAU_SAR.1': 13, 'FAU_SAR.2': 12, 'FAU_SAR.3': 11, 'FAU_SEL.1': 11, 'FAU_STG.2': 1, 'FAU_STG.3': 12, 'FAU_STG.4': 11, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.1': 10, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3.1': 1, 'FAU_STG.4.1': 1, 'FAU_STG': 1, 'FAU_SEL': 1}, 'FCS': {'FCS_CKM.1': 23, 'FCS_CKM.2': 24, 'FCS_COP.1': 22, 'FCS_CKM.1.1': 3, 'FCS_CKM.2.1': 4, 'FCS_COP.1.1': 3, 'FCS_CKM.4': 4}, 'FDP': {'FDP_UCT.1': 13, 'FDP_UIT.1': 12, 'FDP_ACC.1': 24, 'FDP_ACF.1': 18, 'FDP_RIP.2': 14, 'FDP_ACC.1.1': 2, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 5, 'FDP_ACF.1.4': 3, 'FDP_RIP.2.1': 1, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_MSA.3': 1, 'FDP_ACF.2': 1, 'FDP_ITC.1': 2, 'FDP_IFC.1': 3}, 'FIA': {'FIA_ATD.1': 14, 'FIA_UID': 1, 'FIA_SOS.1': 14, 'FIA_UAU.2': 15, 'FIA_UAU.7': 12, 'FIA_UID.2': 15, 'FIA_USB.1': 15, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.2.1': 1, 'FIA_USB.1.1': 2, 'FIA_UAU.1': 2, 'FIA_UID.1': 6, 'FIA_USB': 1}, 'FMT': {'FMT_SMF.1': 25, 'FMT_MSA.2': 14, 'FMT_MSA.1': 23, 'FMT_MSA.3': 21, 'FMT_MTD.1': 55, 'FMT_REV.1': 27, 'FMT_SMR.1': 23, 'FMT_MOF.1': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 3, 'FMT_MSA.3.2': 2, 'FMT_MTD.1.1': 5, 'FMT_REV.1.1': 2, 'FMT_REV.1.2': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF': 2}, 'FPT': {'FPT_AMT.1': 11, 'FPT_RVM.1': 12, 'FPT_SEP.1': 17, 'FPT_STM.1': 10, 'FPT_AMT.1.1': 1, 'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_STM.1.1': 1}, 'FTP': {'FTP_ITC.1': 17, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 2}}, 'cc_claims': {'O': {'O.AUTHORIZATION': 22, 'O.DISCRETIONARY_ACCESS': 23, 'O.AUDITING': 30, 'O.RESIDUAL_INFO': 9, 'O.MANAGE': 30, 'O.ENFORCEMENT': 13, 'O.COMPROT': 24, 'O.MANAG': 1, 'O.RESIDUAL_INFORMATION': 3}, 'T': {'T.UAUSER': 4, 'T.UAACCESS': 4, 'T.COMPROT': 3}, 'A': {'A.LOCATE': 3, 'A.PROTECT': 5, 'A.MANAGE': 5, 'A.NO_EVIL_ADMIN': 4, 'A.COOP': 3, 'A.UTRAIN': 3, 'A.UTRUST': 3, 'A.NET_COMP': 5, 'A.PEER': 3, 'A.CONNECT': 7}, 'OE': {'OE.ADMIN': 7, 'OE.CREDEN': 4, 'OE.INSTALL': 9, 'OE.PHYSICAL': 8, 'OE.INFO_PROTECT': 10, 'OE.MAINTENANCE': 5, 'OE.RECOVER': 8, 'OE.SOFTWARE_IN': 5, 'OE.SERIAL_LOGIN': 4, 'OE.HW_SEP': 8, 'OE.PROTECT': 9, 'OE.INSTAL': 1}}, 'vendor': {}, 'eval_facility': {'atsec': {'atsec': 106}}, 'symmetric_crypto': {'AES_competition': {'RC': {'RC4': 3}}, 'DES': {'DES': {'DES': 1}, '3DES': {'TDES': 3}}, 'miscellaneous': {'SM4': {'SM4': 2}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}, 'MD': {'MD5': {'MD5': 4}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 35}, 'TLS': {'SSL': {'SSL': 45}}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 3}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 7}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#1': 1}, 'BSI': {'AIS137': 1, 'AIS 32': 9}, 'RFC': {'RFC2104': 1}, 'X509': {'X.509': 3}, 'CC': {'CCIMB-99-031': 1}}, 'javacard_version': {}, 'javacard_api_const': {'curves': {'SM2': 4}}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 0270a.pdf.
    • The st_filename property was set to 0270b.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-0270-2004.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0234-2004']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0234-2004']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_DES', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ENV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0270a.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0270b.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 1}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_DES', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ENV', 'level': 1}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name SUSE Linux Enterprise Server 8 with service pack 3 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Operating Systems",
  "cert_link": null,
  "dgst": "a2a4675a7c71bc9a",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0270-2004",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*",
        "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*",
        "cpe:2.3:o:suse:suse_linux:3.0:*:*:*:*:*:*:*",
        "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*",
        "cpe:2.3:o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ENV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_PPC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_DES",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "3",
        "8"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2004-1093",
        "CVE-2004-1005",
        "CVE-2008-3949",
        "CVE-2004-1895",
        "CVE-2004-0554",
        "CVE-2005-0373",
        "CVE-2004-1491",
        "CVE-2004-1142",
        "CVE-2004-0981",
        "CVE-2004-0867",
        "CVE-2004-0940",
        "CVE-2004-0497",
        "CVE-2004-1073",
        "CVE-2005-0384",
        "CVE-2002-0768",
        "CVE-2004-1237",
        "CVE-2004-0929",
        "CVE-2004-0807",
        "CVE-2004-1070",
        "CVE-2004-1175",
        "CVE-2004-1154",
        "CVE-2004-0626",
        "CVE-2004-0460",
        "CVE-2007-4074",
        "CVE-2004-1092",
        "CVE-2005-0156",
        "CVE-2005-0005",
        "CVE-2009-3620",
        "CVE-2004-0461",
        "CVE-2004-0914",
        "CVE-2004-1074",
        "CVE-2002-0854",
        "CVE-2004-0956",
        "CVE-2004-1071",
        "CVE-2002-1285",
        "CVE-2004-0905",
        "CVE-2004-1174",
        "CVE-2004-1235",
        "CVE-2004-1184",
        "CVE-2004-0746",
        "CVE-2007-6167",
        "CVE-2004-1145",
        "CVE-2004-0495",
        "CVE-2004-1170",
        "CVE-2004-1190",
        "CVE-2005-3148",
        "CVE-2004-0866",
        "CVE-2004-0902",
        "CVE-2004-0991",
        "CVE-2007-4393",
        "CVE-2007-0460",
        "CVE-2002-0762",
        "CVE-2000-0361",
        "CVE-2004-0949",
        "CVE-2007-6427",
        "CVE-2004-0535",
        "CVE-2004-1009",
        "CVE-2004-1091",
        "CVE-2005-0639",
        "CVE-2004-0803",
        "CVE-2005-3146",
        "CVE-2004-1090",
        "CVE-2007-1285",
        "CVE-2005-3147",
        "CVE-2005-0206",
        "CVE-2004-0957",
        "CVE-2003-1538",
        "CVE-2004-0888",
        "CVE-2004-1004",
        "CVE-2004-1139",
        "CVE-2000-0218",
        "CVE-2004-1176",
        "CVE-2004-0587",
        "CVE-2004-1098",
        "CVE-2004-1191",
        "CVE-2004-1476",
        "CVE-2004-1072",
        "CVE-2004-0883",
        "CVE-2004-0688",
        "CVE-2004-0903",
        "CVE-2005-0638",
        "CVE-2004-0827",
        "CVE-2004-0889",
        "CVE-2004-0687",
        "CVE-2004-0990",
        "CVE-2005-0337",
        "CVE-2005-1043",
        "CVE-2004-0886",
        "CVE-2004-0817",
        "CVE-2004-0802",
        "CVE-2005-0085",
        "CVE-2005-0605",
        "CVE-2005-0207"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0234-2004"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0234-2004"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "SUSE Linux Products Gmbh",
  "manufacturer_web": "https://www.suse.com/",
  "name": "SUSE Linux Enterprise Server 8 with service pack 3",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2004-09-23",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "0270a.pdf",
    "report_frontpage": {
      "DE": {
        "cert_id": "BSI-DSZ-CC-0270-2004",
        "cert_item": "SuSE Linux Enterprise Server V8 Service Pack 3 with certification-sles-hp-eal3 package",
        "cert_lab": "BSI",
        "developer": "SUSE LINUX AG sponsored by Hewlett Packard Company",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ]
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0234-2004": 2,
          "BSI-DSZ-CC-0270": 1,
          "BSI-DSZ-CC-0270-2004": 28
        }
      },
      "cc_claims": {
        "A": {
          "A.CONNECT": 2,
          "A.COOP": 2,
          "A.LOCATE": 2,
          "A.MANAGE": 2,
          "A.NET_COMP": 2,
          "A.NO_EVIL_ADMIN": 2,
          "A.PEER": 2,
          "A.PROTECT": 2,
          "A.UTRAIN": 2,
          "A.UTRUST": 2
        },
        "OE": {
          "OE.CREDEN": 1,
          "OE.HW_SEP": 1,
          "OE.INFO_PROTECT": 1,
          "OE.INSTALL": 1,
          "OE.MAINTENANCE": 1,
          "OE.RECOVER": 1,
          "OE.SERIAL_LOGIN": 1,
          "OE.SOFTWARE_IN": 1
        },
        "T": {
          "T.COMPROT": 1,
          "T.UAACCESS": 1,
          "T.UAUSER": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 2,
          "ACM_CAP": 2,
          "ACM_CAP.3": 1,
          "ACM_SCP": 2,
          "ACM_SCP.1": 1
        },
        "ADO": {
          "ADO_DEL": 2,
          "ADO_DEL.1": 1,
          "ADO_IGS": 2,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP": 2,
          "ADV_FSP.1": 1,
          "ADV_HLD": 2,
          "ADV_HLD.2": 1,
          "ADV_IMP": 2,
          "ADV_INT": 2,
          "ADV_LLD": 2,
          "ADV_RCR": 2,
          "ADV_RCR.1": 1,
          "ADV_SPM": 2
        },
        "AGD": {
          "AGD_ADM": 2,
          "AGD_ADM.1": 1,
          "AGD_USR": 2,
          "AGD_USR.1": 1
        },
        "ALC": {
          "ALC_DVS": 2,
          "ALC_DVS.1": 1,
          "ALC_FLR": 2,
          "ALC_FLR.3": 5,
          "ALC_LCD": 1,
          "ALC_TAT": 2
        },
        "ASE": {
          "ASE_DES.1": 1,
          "ASE_ENV.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.1": 1,
          "ASE_PPC.1": 1,
          "ASE_REQ.1": 1,
          "ASE_SRE.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV": 2,
          "ATE_COV.2": 1,
          "ATE_DPT": 2,
          "ATE_DPT.1": 1,
          "ATE_FUN": 2,
          "ATE_FUN.1": 1,
          "ATE_IND": 2,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_CCA": 2,
          "AVA_MSU": 2,
          "AVA_MSU.1": 1,
          "AVA_SOF": 4,
          "AVA_SOF.1": 1,
          "AVA_VLA": 4,
          "AVA_VLA.1": 1,
          "AVA_VLA.2": 1,
          "AVA_VLA.3": 1,
          "AVA_VLA.4": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 4": 1,
          "EAL 7": 1,
          "EAL1": 5,
          "EAL2": 3,
          "EAL3": 6,
          "EAL3 augmented": 2,
          "EAL3+": 4,
          "EAL4": 4,
          "EAL5": 6,
          "EAL6": 3,
          "EAL7": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 1,
          "FAU_GEN.2": 1,
          "FAU_SAR.1": 1,
          "FAU_SAR.2": 1,
          "FAU_SAR.3": 1,
          "FAU_SEL.1": 1,
          "FAU_STG.1": 1,
          "FAU_STG.3": 1,
          "FAU_STG.4": 1
        },
        "FCS": {
          "FCS_CKM.1": 1,
          "FCS_CKM.2": 1,
          "FCS_COP.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 1,
          "FDP_ACF.1": 1,
          "FDP_RIP.2": 1,
          "FDP_UCT.1": 1,
          "FDP_UIT.1": 1
        },
        "FIA": {
          "FIA_ATD.1": 1,
          "FIA_SOS.1": 1,
          "FIA_UAU.2": 1,
          "FIA_UAU.7": 1,
          "FIA_UID.2": 1,
          "FIA_USB.1": 1
        },
        "FMT": {
          "FMT_MSA.1": 1,
          "FMT_MSA.2": 1,
          "FMT_MSA.3": 1,
          "FMT_MTD.1": 1,
          "FMT_REV.1": 1,
          "FMT_SMF": 1,
          "FMT_SMR.1": 1
        },
        "FPT": {
          "FPT_AMT.1": 1,
          "FPT_RVM.1": 1,
          "FPT_SEP.1": 1,
          "FPT_STM.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 1
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "Technical Report BSI-DSZ-CC-0270, Version 1.1, 2004-09- 21, atsec Information Security GmbH (confidential document) [9] Controlled Access Protection Profile (CAPP), Version 1.d National Security Agency, 1999-10-08": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 7
        },
        "TLS": {
          "SSL": {
            "SSL": 7
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "atsec": {
          "atsec": 5
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "malfunction": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 32": 1,
          "AIS32": 1,
          "AIS33": 1
        },
        "ISO": {
          "ISO/IEC 15408:1999": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {
        "BSI": {
          "BSI 7125": 2,
          "BSI 7148": 1,
          "BSI 7149": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20041021120604Z",
      "/Creator": "Microsoft Word - 0270_Report_CC_engl-Vorlage V203_final.doc",
      "/Keywords": "Linux SUSE",
      "/ModDate": "D:20041027105841+02\u002700\u0027",
      "/Producer": "Acrobat PDFWriter 4.0 f\u00fcr Windows NT",
      "/Subject": "SUSE Linux Enterprise Server V8",
      "/Title": "certification report 0270",
      "pdf_file_size_bytes": 269860,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 57
    },
    "st_filename": "0270b.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "Diffie-Hellman": 4
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CONNECT": 7,
          "A.COOP": 3,
          "A.LOCATE": 3,
          "A.MANAGE": 5,
          "A.NET_COMP": 5,
          "A.NO_EVIL_ADMIN": 4,
          "A.PEER": 3,
          "A.PROTECT": 5,
          "A.UTRAIN": 3,
          "A.UTRUST": 3
        },
        "O": {
          "O.AUDITING": 30,
          "O.AUTHORIZATION": 22,
          "O.COMPROT": 24,
          "O.DISCRETIONARY_ACCESS": 23,
          "O.ENFORCEMENT": 13,
          "O.MANAG": 1,
          "O.MANAGE": 30,
          "O.RESIDUAL_INFO": 9,
          "O.RESIDUAL_INFORMATION": 3
        },
        "OE": {
          "OE.ADMIN": 7,
          "OE.CREDEN": 4,
          "OE.HW_SEP": 8,
          "OE.INFO_PROTECT": 10,
          "OE.INSTAL": 1,
          "OE.INSTALL": 9,
          "OE.MAINTENANCE": 5,
          "OE.PHYSICAL": 8,
          "OE.PROTECT": 9,
          "OE.RECOVER": 8,
          "OE.SERIAL_LOGIN": 4,
          "OE.SOFTWARE_IN": 5
        },
        "T": {
          "T.COMPROT": 3,
          "T.UAACCESS": 4,
          "T.UAUSER": 4
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_CAP.3": 1,
          "ACM_SCP.1": 1
        },
        "ADO": {
          "ADO_DEL.1": 1,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP.1": 1,
          "ADV_HLD.2": 1,
          "ADV_RCR.1": 1
        },
        "AGD": {
          "AGD_ADM.1": 1,
          "AGD_USR.1": 1
        },
        "ALC": {
          "ALC_DVS.1": 1,
          "ALC_FLR.3": 9
        },
        "ASE": {
          "ASE_REQ.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_MSU.1": 1,
          "AVA_SOF.1": 2,
          "AVA_VLA.1": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 3": 1,
          "EAL 3 augmented": 1,
          "EAL3": 11,
          "EAL3 augmented": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 13,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 9,
          "FAU_GEN.2.1": 1,
          "FAU_SAR.1": 13,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 12,
          "FAU_SAR.2.1": 1,
          "FAU_SAR.3": 11,
          "FAU_SAR.3.1": 1,
          "FAU_SEL": 1,
          "FAU_SEL.1": 11,
          "FAU_SEL.1.1": 1,
          "FAU_STG": 1,
          "FAU_STG.1": 10,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.2": 1,
          "FAU_STG.3": 12,
          "FAU_STG.3.1": 1,
          "FAU_STG.4": 11,
          "FAU_STG.4.1": 1
        },
        "FCS": {
          "FCS_CKM.1": 23,
          "FCS_CKM.1.1": 3,
          "FCS_CKM.2": 24,
          "FCS_CKM.2.1": 4,
          "FCS_CKM.4": 4,
          "FCS_COP.1": 22,
          "FCS_COP.1.1": 3
        },
        "FDP": {
          "FDP_ACC.1": 24,
          "FDP_ACC.1.1": 2,
          "FDP_ACF.1": 18,
          "FDP_ACF.1.1": 2,
          "FDP_ACF.1.2": 2,
          "FDP_ACF.1.3": 5,
          "FDP_ACF.1.4": 3,
          "FDP_ACF.2": 1,
          "FDP_IFC.1": 3,
          "FDP_ITC.1": 2,
          "FDP_MSA.3": 1,
          "FDP_RIP.2": 14,
          "FDP_RIP.2.1": 1,
          "FDP_UCT.1": 13,
          "FDP_UCT.1.1": 1,
          "FDP_UIT.1": 12,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_ATD.1": 14,
          "FIA_ATD.1.1": 1,
          "FIA_SOS.1": 14,
          "FIA_SOS.1.1": 1,
          "FIA_UAU.1": 2,
          "FIA_UAU.2": 15,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.7": 12,
          "FIA_UAU.7.1": 1,
          "FIA_UID": 1,
          "FIA_UID.1": 6,
          "FIA_UID.2": 15,
          "FIA_UID.2.1": 1,
          "FIA_USB": 1,
          "FIA_USB.1": 15,
          "FIA_USB.1.1": 2
        },
        "FMT": {
          "FMT_MOF.1": 1,
          "FMT_MSA.1": 23,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.2": 14,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 21,
          "FMT_MSA.3.1": 3,
          "FMT_MSA.3.2": 2,
          "FMT_MTD.1": 55,
          "FMT_MTD.1.1": 5,
          "FMT_REV.1": 27,
          "FMT_REV.1.1": 2,
          "FMT_REV.1.2": 2,
          "FMT_SMF": 2,
          "FMT_SMF.1": 25,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 23,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_AMT.1": 11,
          "FPT_AMT.1.1": 1,
          "FPT_RVM.1": 12,
          "FPT_RVM.1.1": 1,
          "FPT_SEP.1": 17,
          "FPT_SEP.1.1": 1,
          "FPT_SEP.1.2": 1,
          "FPT_STM.1": 10,
          "FPT_STM.1.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 17,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 3
        }
      },
      "crypto_protocol": {
        "SSH": {
          "SSH": 35
        },
        "TLS": {
          "SSL": {
            "SSL": 45
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "atsec": {
          "atsec": 106
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 4
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "curves": {
          "SM2": 4
        }
      },
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "malfunction": 7
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 32": 9,
          "AIS137": 1
        },
        "CC": {
          "CCIMB-99-031": 1
        },
        "PKCS": {
          "PKCS#1": 1
        },
        "RFC": {
          "RFC2104": 1
        },
        "X509": {
          "X.509": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "RC": {
            "RC4": 3
          }
        },
        "DES": {
          "3DES": {
            "TDES": 3
          },
          "DES": {
            "DES": 1
          }
        },
        "miscellaneous": {
          "SM4": {
            "SM4": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "afx",
      "/CreationDate": "D:20041027112011",
      "/Creator": "HP_SLES_security_target_eal3_nocb_v1.5.doc - Microsoft Word",
      "/Producer": "Acrobat PDFWriter 5.0 for Windows NT",
      "/Title": "HP_SLES_security_target_eal3_nocb_v1.5.doc",
      "pdf_file_size_bytes": 333501,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 90
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0270a.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL3+",
      "ALC_FLR.3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0270b.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "71a688e59e4e3f3d68e9af9c116d34162815cfc610b8fbd67ec4812ebdd5d942",
      "txt_hash": "f881347196d01d3bae39f9a6c12476566f648d61af4b864e67afb68e396416a6"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "b46035e4d1f461e49a459ff23588ed2ae775c83549b8eaa1cbceddb31ab835a8",
      "txt_hash": "4c8441c7f70ef89eaec8005142ca9821787e44eda021bcc6048b1a426e9723ce"
    }
  },
  "status": "archived"
}