This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Red Hat Enterprise Linux 9.4 CCEVS-VR-VID-11526-2025 |
Trusted Platform Module ST33TPHF2X, Firmware 1.769 ANSSI-CC-2022/48 |
|
---|---|---|
name | Red Hat Enterprise Linux 9.4 | Trusted Platform Module ST33TPHF2X, Firmware 1.769 |
category | Operating Systems | Trusted Computing |
scheme | US | FR |
not_valid_after | 25.02.2027 | 14.11.2027 |
not_valid_before | 25.02.2025 | 14.11.2022 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11526-ci.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2022_48.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11526-vr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_48fr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11526-st.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_48en.pdf |
manufacturer | Red Hat, Inc. | STMicroelectronics |
manufacturer_web | https://www.redhat.com | https://www.st.com/ |
security_level | {} | EAL4+, ALC_FLR.1, AVA_VAN.5 |
dgst | f2266dfa9a9ef195 | d4a8b94c7f857f3a |
heuristics/cert_id | CCEVS-VR-VID-11526-2025 | ANSSI-CC-2022/48 |
heuristics/cert_lab | US | [] |
heuristics/cpe_matches | cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.4_ppc64le:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:9.4:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.4_s390x:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.4_aarch64:*:*:*:*:*:*:* | {} |
heuristics/related_cves | CVE-2023-5633, CVE-2022-24805, CVE-2024-9676, CVE-2022-24807, CVE-2024-3049, CVE-2024-6387, CVE-2023-5992, CVE-2024-9675, CVE-2022-24809, CVE-2023-6606, CVE-2024-1488, CVE-2022-24806, CVE-2022-24808, CVE-2023-4911, CVE-2023-47038 | {} |
heuristics/extracted_sars | ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_REQ.2, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 | ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_TSS.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions | 9.4 | 1.769 |
heuristics/report_references/directly_referencing | {} | ANSSI-CC-2021/40 |
heuristics/report_references/indirectly_referencing | {} | ANSSI-CC-2021/40 |
heuristics/scheme_data |
|
|
heuristics/protection_profiles | c40ae795865a0dba, ed9c9d74c3710878, 3d6ad6fde534f6c6 | edccaca44d27fedc |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_4.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pkg_ssh_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-profil-pp-2021_02en.pdf |
pdf_data/cert_filename | st_vid11526-ci.pdf | certificat-cc-2022_48.pdf |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | st_vid11526-vr.pdf | anssi-cc-2022_48fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | st_vid11526-st.pdf | anssi-cible-cc-2022_48en.pdf |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/convert_garbage | False | True |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |