This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Red Hat Enterprise Linux 9.4 CCEVS-VR-VID-11526-2025 |
eTravel 2.5.A BAC on MultiApp V5.0.A(version 2.5.A.0) ANSSI-CC-2022/54 |
|
---|---|---|
name | Red Hat Enterprise Linux 9.4 | eTravel 2.5.A BAC on MultiApp V5.0.A(version 2.5.A.0) |
category | Operating Systems | Trusted Computing |
scheme | US | FR |
not_valid_after | 25.02.2027 | 12.12.2027 |
not_valid_before | 25.02.2025 | 12.12.2022 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11526-ci.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2022_54.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11526-vr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_54fr-bac.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11526-st.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_54en.pdf |
manufacturer | Red Hat, Inc. | THALES DIS FRANCE SA |
manufacturer_web | https://www.redhat.com | https://www.thalesgroup.com/en/europe/france |
security_level | {} | ADV_TDS.4, ALC_CMS.5, ATE_DPT.3, ADV_INT.2, ADV_FSP.5, EAL4+, ALC_DVS.2, ALC_TAT.2 |
dgst | f2266dfa9a9ef195 | fd12e4a5d64c3ecd |
heuristics/cert_id | CCEVS-VR-VID-11526-2025 | ANSSI-CC-2022/54 |
heuristics/cert_lab | US | [] |
heuristics/cpe_matches | cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.4_ppc64le:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:9.4:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.4_s390x:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.4_aarch64:*:*:*:*:*:*:* | {} |
heuristics/related_cves | CVE-2023-5633, CVE-2022-24805, CVE-2024-9676, CVE-2022-24807, CVE-2024-3049, CVE-2025-1756, CVE-2024-6387, CVE-2023-5992, CVE-2024-9675, CVE-2023-4911, CVE-2022-24809, CVE-2022-24806, CVE-2024-1488, CVE-2022-24808, CVE-2023-6606, CVE-2023-47038 | {} |
heuristics/extracted_sars | AGD_PRE.1, ASE_CCL.1, ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_SPD.1, ASE_INT.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, ASE_OBJ.2, AGD_OPE.1, ASE_ECD.1, ALC_TSU_EXT.1, ASE_REQ.2 | ALC_CMS.5, ADV_TDS.4, ATE_DPT.3, ALC_DVS.2, ADV_ARC.1, ADV_FSP.5, ADV_INT.2, ALC_TAT.2 |
heuristics/extracted_versions | 9.4 | 5.0, 2.5 |
heuristics/scheme_data |
|
|
heuristics/protection_profiles | c40ae795865a0dba, ed9c9d74c3710878, 3d6ad6fde534f6c6 | 60455fc9564e2545 |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_4.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pkg_ssh_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf |
pdf_data/cert_filename | st_vid11526-ci.pdf | certificat-cc-2022_54.pdf |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | st_vid11526-vr.pdf | anssi-cc-2022_54fr-bac.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | st_vid11526-st.pdf | anssi-cible-cc-2022_54en.pdf |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/extract_ok | True | False |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/extract_ok | True | False |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |