name |
Ubuntu LTS 16.04.4 with KVM and QEMU 2.5 |
ID-One COSMO X Codes SAAAAR : 093363 + patch 099E71 ; 093364 + patchs 099441 et 099E21 ; 093366 |
category |
Operating Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
SE |
FR |
status |
archived |
active |
not_valid_after |
04.07.2023 |
23.05.2028 |
not_valid_before |
04.07.2018 |
23.05.2023 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CCRA%20Certificate%20Ubuntu.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_06fr.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20Ubuntu%20LTS%2016.04.4.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_06fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST-Ubuntu_16.04_LTS-1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-2023_06en.pdf |
manufacturer |
Canonical Group Limited |
Idemia |
manufacturer_web |
https://www.canonical.com/ |
https://www.idemia.com |
security_level |
EAL2, ALC_FLR.3 |
ADV_IMP.2, ALC_FLR.1, ALC_CMC.5, EAL5+, AVA_VAN.5, ATE_COV.3, ALC_TAT.3, ATE_FUN.2, ADV_TDS.5, ADV_INT.3, ALC_DVS.2 |
dgst |
13c72eba73efe67d |
6233b7fe7e291f87 |
heuristics/cert_id |
CSEC2016011 |
ANSSI-CC-2023/06 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ATE_FUN.2, ALC_TAT.3, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_IMP.2, ALC_CMC.5, ASE_REQ.2, ADV_INT.3, ALC_COV.3, ASE_CCL.1, ATE_COV.3 |
heuristics/extracted_versions |
2.5, 16.04.4 |
099441, 093366, 093363, 093364 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
NSCIB-CC-2300050-01-CR, NSCIB-CC-2300063-01-CR, ANSSI-CC-2023/24, ANSSI-CC-2023/28, NSCIB-CC-2300062-01-CR, ANSSI-CC-2023/21, NSCIB-CC-2300061-01-CR, ANSSI-CC-2023/26, ANSSI-CC-2023/27, ANSSI-CC-2023/25 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1107-V3-2022 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2023/28, NSCIB-CC-2300062-01-CR, ANSSI-CC-2023/21, NSCIB-CC-2300123-01-CR, NSCIB-CC-2300050-01-CR, NSCIB-CC-2300063-01-CR, NSCIB-CC-2300061-02-CR2, ANSSI-CC-2023/51, ANSSI-CC-2023/49, ANSSI-CC-2023/24, NSCIB-CC-2300061-01-CR, ANSSI-CC-2023/27, ANSSI-CC-2023/47, ANSSI-CC-2023/25, ANSSI-CC-2023/48, NSCIB-CC-2300063-02-CR2, ANSSI-CC-2023/50, NSCIB-CC-2300062-02-CR2, ANSSI-CC-2023/26 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1107-V3-2022 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
ANSSI-CC-2023/24, ANSSI-CC-2023/29, ANSSI-CC-2023/28, ANSSI-CC-2023/21, NSCIB-CC-2300061-01-CR, ANSSI-CC-2023/27, ANSSI-CC-2023/25 |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1107-V3-2022 |
heuristics/st_references/indirectly_referenced_by |
{} |
ANSSI-CC-2023/24, ANSSI-CC-2023/29, ANSSI-CC-2023/28, ANSSI-CC-2023/21, NSCIB-CC-2300061-01-CR, ANSSI-CC-2023/27, ANSSI-CC-2023/25 |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1107-V3-2022 |
heuristics/protection_profiles |
{} |
94167fd161e87d71 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf |
pdf_data/cert_filename |
CCRA Certificate Ubuntu.pdf |
certificat-CC-2023_06fr.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
- ADV:
- ADV_IMP.2: 1
- ADV_INT.3: 1
- ADV_TDS.5: 1
- ALC:
- ALC_CMC.5: 1
- ALC_DVS.2: 1
- ALC_FLR.1: 1
- ALC_TAT.3: 1
- ATE:
- ATE_COV.3: 1
- ATE_FUN.2: 1
- AVA:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20180705084810+02'00'
- /ModDate: D:20180730084901+02'00'
- pdf_file_size_bytes: 1416660
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20230602161520+02'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20230602161520+02'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 181485
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
Certification Report Ubuntu LTS 16.04.4.pdf |
ANSSI-CC-2023_06fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1107-V3-2022: 1
- FR:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0099-2017: 2
- BSI-PP-0084-2014: 1
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 1
- ALC_FLR.3: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_IMP.2: 1
- ADV_INT.3: 1
- ADV_TDS.5: 1
- AGD:
- AGD_ALP: 2
- AGD_BIO: 3
- AGD_OPE: 3
- AGD_PRE: 4
- ALC:
- ALC_CMC.5: 1
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.1: 2
- ALC_TAT.3: 1
- ATE:
- ATE_COV.3: 1
- ATE_FUN.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.AUTHUSER: 1
- A.CONNECT: 1
- A.DETECT: 1
- A.IT: 1
- A.KEYS: 1
- A.MANAGE: 1
- A.PEER: 2
- A.PHYSICAL: 1
- A.TRAINEDUSER: 1
- T:
- T.ACCESS: 6
- T.COMM: 1
- T.IA: 2
- T.INFOFLOW: 1
- T.RESTRICT: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
- CVE:
- CVE-2017-0861: 1
- CVE-2017-15129: 1
- CVE-2017-16808: 1
- CVE-2017-17805: 1
- CVE-2017-17806: 1
- CVE-2018-3639: 1
- CVE-2018-9056: 1
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ISO:
- RFC:
- RFC 2460: 1
- RFC 3484: 1
- RFC 3542: 1
- RFC 4213: 1
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Ansvarigt Område/enhet: CSEC
- /Author: Jerry Johansson
- /C-datum: 2008
- /CSEC ID:
- /CSECID:
- /Company: FMV/CSEC
- /ContentTypeId: 0x010100209C0526C7C5A44683868ABD684765F80200B916D1351C38174AA524317F62806230
- /Copy: 0
- /CreationDate: D:20190131103138+01'00'
- /Creator: Acrobat PDFMaker 11 för Word
- /Current Version: 0.9
- /DDocBinder: Scheme (CB)
- /DDocCabinet: QMS
- /DDocID: 2005-03-05-64D6-T9YR
- /DDocLastModDate: 2006-03-16 10:56:39
- /DDocLibrary: https://haddock.fmv.se/domdoc/CSECLib.nsf
- /DDocRevision: 3,7
- /DDocTitle: 035 CB General Document - Template
- /Datum, skapat: -
- /Deluppdragsbenämning:
- /Dokument Status: Aktiv
- /Dokumentansvarig: Jerry Johansson
- /Dokumentansvarigs enhet: KC Ledsyst
- /Dokumentbeteckning:
- /Dokumentdatum: 2018-Jul-04
- /Dokumenttitel: Certification Report Canonical Ubuntu LTS 16.04.4
- /Dokumenttyp: CB
- /FMV_beteckning: 16FMV12482-52:1
- /Fast_Roll:
- /Fast_av:
- /Fast_den: 2014-01-27T19:05:45Z
- /Fastställarens roll: Lead Certifier
- /Fastställd den: 2016-06-10T19:05:00Z
- /Fastställt av: Jerry Johansson
- /Fastställt av1: Jerry Johansson
- /Giltigt från: -
- /Infoklass: Öppen
- /Informationsklass:
- /Keywords:
- /Klassificeringsnr: 25 550
- /MallVersion: 7.0
- /ModDate: D:20190201073718+01'00'
- /Paragraf:
- /Platina: 1
- /Producer: Adobe PDF Library 11.0
- /Referens ID: FMVID-297-738
- /Sekr. gäller tom.: -
- /SourceModified:
- /Status: Aktivt
- /Stämpel: 0
- /Subject: 16FMV12482-52:1
- /Title: Certification Report Canonical Ubuntu LTS 16.04.4
- /Uncontrolled: 0.000000
- /Uppdragsbenämning:
- /Utgåva: 1.0
- /_dlc_DocId: CSEC-37-1650
- /_dlc_DocIdItemGuid: cfa7e571-175c-4889-bd10-378edb70609a
- /_dlc_DocIdUrl: http://sp.fmv.se/sites/CSEC/_layouts/15/DocIdRedir.aspx?ID=CSEC-37-1650, CSEC-37-1650
- /Ärendetyp: 6
- pdf_file_size_bytes: 166835
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
|
pdf_data/st_filename |
ST-Ubuntu_16.04_LTS-1.0.pdf |
ANSSI-cible-2023_06en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI_DSZ-CC-1107-V3-2022: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0068-V2: 1
- BSI-CC-PP-0068-V2-MA-01: 1
- BSI-CC-PP-0084-2014: 1
- BSI-CC-PP-0099-2017: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 1
- EAL4: 1
|
- EAL:
- EAL4: 1
- EAL4 augmented: 1
- EAL5: 6
- EAL5 augmented: 2
- EAL5+: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.3: 5
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_FSP.5: 8
- ADV_IMP: 1
- ADV_IMP.1: 6
- ADV_IMP.2: 12
- ADV_INT: 1
- ADV_INT.3: 9
- ADV_TDS: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 4
- ADV_TDS.4: 1
- ADV_TDS.5: 15
- AGD:
- AGD_ALP: 3
- AGD_BIO: 3
- AGD_OPE: 7
- AGD_OPE.1: 8
- AGD_PAPI: 5
- AGD_PRE: 12
- AGD_PRE.1: 6
- ALC:
- ALC_CMC: 1
- ALC_CMC.5: 10
- ALC_CMS.1: 1
- ALC_CMS.5: 1
- ALC_COV.3: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 14
- ALC_FLR: 1
- ALC_FLR.1: 8
- ALC_LCD.1: 3
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.3: 11
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 2
- ATE_COV.3: 10
- ATE_DPT.1: 2
- ATE_DPT.3: 1
- ATE_FUN: 1
- ATE_FUN.1: 4
- ATE_FUN.2: 11
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 8
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_SEL.1: 8
- FAU_SEL.1.1: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 7
- FAU_STG.3.1: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 34
- FCS_CKM.1.1: 3
- FCS_CKM.2: 13
- FCS_CKM.2.1: 1
- FCS_CKM.4: 13
- FCS_CKM.4.1: 1
- FCS_COP.1: 26
- FCS_COP.1.1: 6
- FCS_RNG: 2
- FCS_RNG.1: 33
- FCS_RNG.1.1: 4
- FCS_RNG.1.2: 5
- FDP:
- FDP_ACC.1: 38
- FDP_ACC.1.1: 3
- FDP_ACC.2: 19
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 2
- FDP_ACF.1: 42
- FDP_ACF.1.1: 5
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 5
- FDP_ACF.1.4: 5
- FDP_CDP: 5
- FDP_CDP.1: 14
- FDP_CDP.1.1: 2
- FDP_ETC.2: 8
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 14
- FDP_IFC.2: 20
- FDP_IFC.2.1: 2
- FDP_IFC.2.2: 2
- FDP_IFF.1: 26
- FDP_IFF.1.1: 3
- FDP_IFF.1.2: 3
- FDP_IFF.1.3: 3
- FDP_IFF.1.4: 3
- FDP_IFF.1.5: 3
- FDP_ITC.1: 4
- FDP_ITC.2: 22
- FDP_ITC.2.1: 2
- FDP_ITC.2.2: 2
- FDP_ITC.2.3: 2
- FDP_ITC.2.4: 2
- FDP_ITC.2.5: 2
- FDP_RIP.2: 13
- FDP_RIP.2.1: 1
- FDP_UCT: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 19
- FIA_ATD.1.1: 2
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 12
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 10
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UID.1: 14
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 50
- FMT_MSA.1.1: 5
- FMT_MSA.3: 51
- FMT_MSA.3.1: 7
- FMT_MSA.3.2: 7
- FMT_MSA.4: 6
- FMT_MSA.4.1: 1
- FMT_MTD.1: 91
- FMT_MTD.1.1: 13
- FMT_REV.1: 15
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SMF.1: 25
- FMT_SMF.1.1: 1
- FMT_SMR.1: 35
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FPT_TDC.1: 22
- FPT_TDC.1.1: 2
- FPT_TDC.1.2: 2
- FTA:
- FTA_SSL.1: 7
- FTA_SSL.1.1: 1
- FTA_SSL.1.2: 1
- FTA_SSL.2: 7
- FTA_SSL.2.1: 1
- FTA_SSL.2.2: 1
- FTP:
- FTP_ITC.1: 11
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
- FAU:
- FAU_ARP.1: 20
- FAU_ARP.1.1: 1
- FAU_GEN: 1
- FAU_GEN.1: 2
- FAU_SAA.1: 3
- FAU_STG.2: 8
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FCO:
- FCS:
- FCS_CKM: 73
- FCS_CKM.1: 28
- FCS_CKM.1.1: 1
- FCS_CKM.2: 4
- FCS_CKM.4: 41
- FCS_CKM.4.1: 1
- FCS_COP: 114
- FCS_COP.1: 26
- FCS_COP.1.1: 1
- FCS_RND: 12
- FCS_RND.1: 3
- FCS_RND.1.1: 1
- FCS_RNG: 2
- FCS_RNG.1: 11
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 104
- FDP_ACC.1: 30
- FDP_ACC.2: 17
- FDP_ACF: 85
- FDP_ACF.1: 44
- FDP_IFC: 31
- FDP_IFC.1: 25
- FDP_IFC.2: 2
- FDP_IFF: 25
- FDP_IFF.1: 16
- FDP_ITC: 30
- FDP_ITC.1: 14
- FDP_ITC.2: 20
- FDP_RIP: 202
- FDP_RIP.1: 13
- FDP_ROL: 21
- FDP_ROL.1: 6
- FDP_SDI: 28
- FDP_SDI.2: 6
- FDP_UCT: 14
- FDP_UCT.1: 1
- FDP_UIT: 20
- FDP_UIT.1: 4
- FIA:
- FIA_AFL: 58
- FIA_AFL.1: 12
- FIA_ATD: 9
- FIA_ATD.1: 2
- FIA_UAU: 155
- FIA_UAU.1: 18
- FIA_UAU.4: 4
- FIA_UAU.5: 5
- FIA_UAU.6: 2
- FIA_UAU.7: 2
- FIA_UID: 61
- FIA_UID.1: 23
- FIA_UID.2: 1
- FIA_USB: 8
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 15
- FMT_LIM.1: 5
- FMT_LIM.1.1: 1
- FMT_LIM.2: 5
- FMT_LIM.2.1: 1
- FMT_MOF: 19
- FMT_MOF.1: 2
- FMT_MSA: 224
- FMT_MSA.1: 25
- FMT_MSA.2: 6
- FMT_MSA.3: 33
- FMT_MSA.4: 1
- FMT_MTD: 109
- FMT_MTD.1: 12
- FMT_MTD.2: 2
- FMT_MTD.3: 1
- FMT_SMF: 93
- FMT_SMF.1: 45
- FMT_SMF.1.1: 1
- FMT_SMR: 93
- FMT_SMR.1: 74
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_SMR.2: 6
- FPR:
- FPR_UNO: 17
- FPR_UNO.1: 18
- FPR_UNO.1.1: 1
- FPT:
- FPT_EMS: 10
- FPT_EMS.1: 6
- FPT_EMS.1.1: 2
- FPT_EMS.1.2: 2
- FPT_FLS: 54
- FPT_FLS.1: 25
- FPT_FLS.1.1: 2
- FPT_PHP: 12
- FPT_PHP.3: 1
- FPT_RCV: 25
- FPT_RCV.3: 7
- FPT_RCV.4: 1
- FPT_TDC: 9
- FPT_TDC.1: 10
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 21
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FTP:
- FTP_ITC: 30
- FTP_ITC.1: 10
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- A.AUTHUSER: 3
- A.CONNECT: 5
- A.DETECT: 3
- A.IT: 2
- A.KEYS: 3
- A.MANAGE: 5
- A.PEER: 6
- A.PHYSICAL: 4
- A.TRAINEDUSER: 3
- O:
- O.AUDITING: 14
- O.COMP: 32
- O.CP: 17
- O.CRYPTO: 15
- O.DISCRETIONARY: 10
- O.MANAGE: 26
- O.NETWORK: 12
- O.SUBJECT: 10
- O.TRUSTED_CHANNEL: 4
- OE:
- OE.ADMIN: 6
- OE.INFO_PROTECT: 8
- OE.INSTALL: 4
- OE.IT: 4
- OE.MAINTENANCE: 3
- OE.PHYSICAL: 3
- OE.RECOVER: 4
- OE.REMOTE: 4
- OE.TRUSTED: 5
- T:
- T.ACCESS: 24
- T.COMM: 4
- T.IA: 6
- T.INFOFLOW: 4
- T.RESTRICT: 3
|
- A:
- A.CAP_FILE: 5
- A.DELETION: 3
- A.VERIFICATION: 5
- D:
- D.API_DATA: 3
- D.APP_CODE: 7
- D.APP_C_DATA: 3
- D.APP_I_DATA: 6
- D.ARRAY: 3
- D.BIO: 11
- D.CLFDB-DK: 1
- D.CONFIG: 4
- D.CRYPTO: 5
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.JCS_KEY: 1
- D.JCS_KEYS: 7
- D.MODULES: 2
- D.NB_REMAINTRYGLB: 1
- D.PERSO_DUMP: 4
- D.PIN: 11
- D.SEC_DATA: 7
- D.SENSITIVE_DATA: 5
- O:
- O.ALARM: 22
- O.APPLET: 16
- O.ARRAY_VIEWS_CONFID: 8
- O.ARRAY_VIEWS_INTEG: 9
- O.BIO-: 3
- O.BIO-MNGT: 22
- O.CARD-MANAGEMENT: 1
- O.CARD_MANAGEMENT: 65
- O.CIPHER: 26
- O.CLFDB_DECIPHER: 13
- O.CODE_PKG: 22
- O.DBI-: 1
- O.DBI-MNGT: 24
- O.DELETION: 15
- O.DUMP_PERSO: 22
- O.FIREWALL: 64
- O.FLEXICODE: 19
- O.GLOBAL_ARRAYS_CONFID: 20
- O.GLOBAL_ARRAYS_INTEG: 11
- O.INSTALL: 16
- O.JAVAOBJECT: 54
- O.KEY-MNGT: 31
- O.LOAD: 18
- O.MTC-: 8
- O.MTC-CTR-: 2
- O.MTC-CTR-MNGT: 8
- O.NATIVE: 18
- O.OBJ-: 1
- O.OBJ-DELETION: 7
- O.OPERATE: 40
- O.PATCH_LOADING: 23
- O.PIN-: 2
- O.PIN-MNGT: 27
- O.REALLOCATION: 17
- O.RESIDENT_APPLICATION: 35
- O.RESOURCES: 24
- O.RNG: 10
- O.SCP: 68
- O.SECURE_COMPARE: 9
- O.SENSITIVE_ARRAYS_INTEG: 8
- O.SID: 33
- O.TRANSACTION: 20
- OE:
- OE.APPLET: 2
- OE.CAP_FILE: 10
- OE.CARD-MANAGEMENT: 1
- OE.CARD_MANAGEMENT: 3
- OE.CLFDB_ENC: 7
- OE.CODE-EVIDENCE: 21
- OE.NATIVE: 1
- OE.SCP: 12
- OE.VERIFICATION: 39
- OP:
- OP.ARRAY_AASTORE: 3
- OP.ARRAY_ACCESS: 9
- OP.ARRAY_LENGTH: 3
- OP.ARRAY_T_ALOAD: 1
- OP.ARRAY_T_ASTORE: 1
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.FLOW: 3
- OP.IMPORT_KEY: 2
- OP.INSTANCE_FIELD: 5
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 5
- OP.LOCAL_STACK_ACCESS: 3
- OP.NATIVE: 1
- OP.NATIVE_ACCESS: 3
- OP.NATIVE_INTERFACE_CALL: 1
- OP.OPERAND_STACK_ACCESS: 3
- OP.PUT: 6
- OP.PUTFIELD: 1
- OP.PUTSTATIC: 1
- OP.STATIC_FIELD: 3
- OP.THROW: 5
- OP.TPL: 1
- OP.TYPE_ACCESS: 5
- OSP:
- OSP.CLFDB_ENC: 4
- OSP.VERIFICATION: 6
- R:
- T:
- T.CLFDB-DISC: 5
- T.CONFID-APPLI-DATA: 21
- T.CONFID-JCS-CODE: 7
- T.CONFID-JCS-DATA: 12
- T.CONFIGURATION: 4
- T.CONF_DATA_APPLET: 4
- T.DELETION: 6
- T.EXE-: 1
- T.EXE-CODE: 8
- T.FLEXICODE: 5
- T.INSTALL: 6
- T.INTEG-: 2
- T.INTEG-APPLI-: 3
- T.INTEG-APPLI-CODE: 13
- T.INTEG-APPLI-DATA: 26
- T.INTEG-JCS-CODE: 7
- T.INTEG-JCS-DATA: 12
- T.NATIVE: 7
- T.OBJ-DELETION: 4
- T.PATCH_LOADING: 4
- T.PERSO_DUMP: 5
- T.PHYSICAL: 5
- T.RESOURCES: 8
- T.SID: 18
|
pdf_data/st_keywords/vendor |
|
- Idemia:
- Infineon:
- Infineon: 7
- Infineon Technologies AG: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 1
- TDES: 11
- Triple-DES: 6
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 1
- SHA-256: 4
- SHA-384: 4
- SHA-512: 4
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 3
- SHA-256: 5
- SHA-384: 3
- SHA-512: 1
- SHA256: 2
- SHA3:
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 2
- Key agreement: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 1
- P-384: 1
- P-521: 1
- curve P-256: 1
- curve P-384: 1
- curve P-521: 1
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 1
- Physical Tampering: 3
- fault injection: 1
- malfunction: 6
- physical tampering: 2
- SCA:
- DPA: 3
- SPA: 2
- physical probing: 6
- timing attack: 1
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.ChipSecurity: 1
- EF.DG1: 5
- EF.DG16: 5
- EF.DG3: 2
- EF.DG4: 2
|
pdf_data/st_keywords/standard_id |
- BSI:
- FIPS:
- FIPS 140-2: 7
- FIPS 180-4: 6
- FIPS 186-4: 1
- FIPS 197: 5
- FIPS 198-1: 2
- FIPS 46-3: 1
- FIPS PUB 186-4: 4
- FIPS180-4: 2
- FIPS197: 2
- PKCS:
- RFC:
- RFC 2460: 1
- RFC 3484: 1
- RFC 3542: 1
- RFC 4213: 1
- RFC 4252: 4
- RFC 4253: 3
- RFC 768: 1
- RFC 791: 2
- RFC 792: 1
- RFC 793: 1
- RFC3526: 2
- RFC4252: 6
- RFC4253: 13
- RFC4419: 3
- RFC5656: 4
- RFC6668: 2
|
- FIPS:
- FIPS 140-2: 1
- FIPS 140-3: 1
- FIPS 198: 1
- FIPS PUB 180-3: 3
- FIPS PUB 186-3: 1
- FIPS PUB 197: 8
- FIPS PUB 46-3: 6
- FIPS PUB 81: 10
- FIPS1: 3
- ICAO:
- ISO:
- ISO/IEC 14443: 4
- ISO/IEC 14443-3: 1
- ISO/IEC 7816: 2
- ISO/IEC 7816-6: 1
- ISO/IEC 9796-1: 2
- ISO/IEC 9797: 16
- ISO/IEC 9797-1: 1
- NIST:
- PKCS:
- RFC:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
- curves:
- BRAINPOOLP192R1: 2
- BRAINPOOLP192T1: 2
- BRAINPOOLP224R1: 2
- BRAINPOOLP224T1: 2
- BRAINPOOLP256R1: 2
- BRAINPOOLP256T1: 2
- BRAINPOOLP320R1: 2
- BRAINPOOLP320T1: 2
- BRAINPOOLP384R1: 2
- BRAINPOOLP384T1: 2
- BRAINPOOLP512R1: 2
- BRAINPOOLP512T1: 2
- FRP256V1: 2
- SECP192R1: 2
- SECP224R1: 2
- SECP256R1: 2
- SECP384R1: 2
- SECP521R1: 2
- misc:
|
pdf_data/st_keywords/javacard_packages |
|
- com:
- com.oberthurcs.javacard: 1
- javacard:
- javacard.framework: 6
- javacard.security: 5
- javacardx:
- javacardx.biometry: 1
- javacardx.crypto: 4
- javacardx.framework.util: 1
- javacardx.security: 3
- javacardx.security.util: 3
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users that cannot be used to store: 1
- PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation: 1
- as Port Address Translation (PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation. Furthermore, packet mangling support is provided with IPTables which is also: 1
- out of scope: 3
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: Stephan Mueller (generated by CCTool version 2.8.4.6)
- /CreationDate: D:20180627092838Z
- /Creator: Unknown
- /Keywords: Security Target, Common Criteria, Linux Distribution
- /ModDate: D:20180730084951+02'00'
- /Producer: XEP 4.18 build 20100322
- /Subject: Ubuntu
- /Title: Security Target for Ubuntu 16.04 LTS (version 1.0 as of 2018-06-27)
- /Trapped: /False
- /application: CCTool version x.y
- pdf_file_size_bytes: 1143627
- pdf_hyperlinks: http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R4.pdf, http://tools.ietf.org/html/rfc4252, http://tools.ietf.org/html/rfc5656, http://tools.ietf.org/html/rfc4253, http://tools.ietf.org/html/rfc3526, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R4.pdf, http://tools.ietf.org/html/rfc6668, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R4.pdf, http://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf, http://tools.ietf.org/html/rfc4419
- pdf_is_encrypted: False
- pdf_number_of_pages: 114
|
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |