SUSE Linux Enterprise Server 12 SP2 - NSS Cryptographic Module
Certificate #3216
Webpage information ?
Security policy ?
Symmetric Algorithms
AES, RC2, RC5, DES, Triple-DES, TDEA, Camellia, SEED, HMAC, HMAC-SHA-224, HMAC-SHA-384, HMAC-SHA-512Asymmetric Algorithms
ECDSA, Diffie-Hellman, DSAHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, MD5Schemes
MACProtocols
TLSRandomness
DRBG, RNGLibraries
NSSElliptic Curves
P-256, P-384, P-521Block cipher modes
ECB, CBC, CTR, GCMSecurity level
Level 1Side-channel analysis
Timing attacks, Timing attack, timing attacks, Timing AttacksStandards
FIPS 140-2, FIPS140-2, FIPS186-4, FIPS 197, FIPS 180-4, FIPS 198-1, FIPS 186-4, SP 800-135, SP 800-38F, SP 800-90A, NIST SP 800-67, NIST SP 800-38A, NIST SP 800-38D, NIST SP 800-38F, NIST SP 800-56A, NIST SP 800-90A, PKCS #11, PKCS#1File metadata
Title | FIPS 140-2 Non-Proprietary Security Policy |
---|---|
Subject | SUSE Linux Enterprise Server 12 - NSS Module |
Author | CMVP |
Creation date | D:20180417075600-05'00' |
Pages | 32 |
Creator | Writer |
Producer | LibreOffice 5.4 |
Heuristics ?
CPE matches
- cpe:2.3:o:suse:linux_enterprise:12.0:sp5:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:raspberry_pi:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:sap:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:business_critical_linux:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:*:sap:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:-:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:business_critical_linux:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:espos:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:-:sap:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:espos:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:*:sap:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp2:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp2:*:*:*:*:raspberry_pi:*
- cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp4:*:*:*:*:*:*
Related CVEs
ID | Links | Severity | CVSS Score | Published on | ||
---|---|---|---|---|---|---|
Base | Exploitability | Impact | ||||
CVE-2011-3172 | CRITICAL | 9.8 | 5.9 | 08.06.2018 13:29 | ||
CVE-2014-2977 | HIGH | 10.0 | 10.0 | 11.06.2014 14:55 | ||
CVE-2014-2978 | HIGH | 10.0 | 10.0 | 11.06.2014 14:55 | ||
CVE-2014-3673 | HIGH | 7.5 | 3.6 | 10.11.2014 11:55 | ||
CVE-2014-9116 | MEDIUM | 5.0 | 2.9 | 02.12.2014 16:59 | ||
CVE-2014-9761 | CRITICAL | 9.8 | 5.9 | 19.04.2016 21:59 | ||
CVE-2014-9854 | HIGH | 7.5 | 3.6 | 17.03.2017 14:59 | ||
CVE-2015-0192 | HIGH | 7.5 | 6.4 | 02.07.2015 21:59 | ||
CVE-2015-1241 | MEDIUM | 4.3 | 2.9 | 19.04.2015 10:59 | ||
CVE-2015-2734 | HIGH | 10.0 | 10.0 | 06.07.2015 02:01 | ||
CVE-2015-2737 | HIGH | 10.0 | 10.0 | 06.07.2015 02:01 | ||
CVE-2015-2738 | HIGH | 10.0 | 10.0 | 06.07.2015 02:01 | ||
CVE-2015-3340 | LOW | 2.9 | 2.9 | 28.04.2015 14:59 | ||
CVE-2015-4000 | LOW | 3.7 | 1.4 | 21.05.2015 00:59 | ||
CVE-2015-4680 | HIGH | 7.5 | 3.6 | 05.04.2017 17:59 | ||
CVE-2015-5006 | LOW | 2.1 | 2.9 | 07.12.2015 20:59 | ||
CVE-2015-5041 | CRITICAL | 9.1 | 5.2 | 06.06.2016 17:59 | ||
CVE-2015-5154 | HIGH | 7.2 | 10.0 | 12.08.2015 14:59 | ||
CVE-2015-5239 | MEDIUM | 6.5 | 3.6 | 23.01.2020 20:15 | ||
CVE-2015-5300 | HIGH | 7.5 | 3.6 | 21.07.2017 14:29 | ||
CVE-2015-7547 | HIGH | 8.1 | 5.9 | 18.02.2016 21:59 | ||
CVE-2015-7976 | MEDIUM | 4.3 | 1.4 | 30.01.2017 21:59 | ||
CVE-2015-8776 | CRITICAL | 9.1 | 5.2 | 19.04.2016 21:59 | ||
CVE-2015-8778 | CRITICAL | 9.8 | 5.9 | 19.04.2016 21:59 | ||
CVE-2015-8779 | CRITICAL | 9.8 | 5.9 | 19.04.2016 21:59 | ||
CVE-2015-8816 | MEDIUM | 6.8 | 5.9 | 27.04.2016 17:59 | ||
CVE-2016-0264 | MEDIUM | 5.6 | 3.4 | 24.05.2016 15:59 | ||
CVE-2016-1602 | HIGH | 7.8 | 5.9 | 23.03.2017 06:59 | ||
CVE-2016-1651 | HIGH | 8.1 | 5.2 | 18.04.2016 10:59 | ||
CVE-2016-1652 | MEDIUM | 6.1 | 2.7 | 18.04.2016 10:59 | ||
CVE-2016-1653 | HIGH | 8.8 | 5.9 | 18.04.2016 10:59 | ||
CVE-2016-1654 | MEDIUM | 6.5 | 3.6 | 18.04.2016 10:59 | ||
CVE-2016-1655 | HIGH | 8.8 | 5.9 | 18.04.2016 10:59 | ||
CVE-2016-1656 | HIGH | 7.5 | 3.6 | 18.04.2016 10:59 | ||
CVE-2016-1659 | CRITICAL | 9.8 | 5.9 | 18.04.2016 10:59 | ||
CVE-2016-1672 | HIGH | 8.8 | 5.9 | 05.06.2016 23:59 | ||
CVE-2016-1673 | HIGH | 8.8 | 5.9 | 05.06.2016 23:59 | ||
CVE-2016-1674 | HIGH | 8.8 | 5.9 | 05.06.2016 23:59 | ||
CVE-2016-1675 | HIGH | 8.8 | 5.9 | 05.06.2016 23:59 | ||
CVE-2016-1676 | HIGH | 8.8 | 5.9 | 05.06.2016 23:59 | ||
CVE-2016-1677 | MEDIUM | 6.5 | 3.6 | 05.06.2016 23:59 | ||
CVE-2016-1678 | HIGH | 8.8 | 5.9 | 05.06.2016 23:59 | ||
CVE-2016-1679 | HIGH | 8.8 | 5.9 | 05.06.2016 23:59 | ||
CVE-2016-1680 | HIGH | 8.8 | 5.9 | 05.06.2016 23:59 | ||
CVE-2016-1681 | HIGH | 8.8 | 5.9 | 05.06.2016 23:59 | ||
CVE-2016-1682 | MEDIUM | 6.1 | 2.7 | 05.06.2016 23:59 | ||
CVE-2016-1683 | HIGH | 7.5 | 5.9 | 05.06.2016 23:59 | ||
CVE-2016-1685 | MEDIUM | 6.5 | 3.6 | 05.06.2016 23:59 | ||
CVE-2016-1686 | MEDIUM | 6.5 | 3.6 | 05.06.2016 23:59 | ||
CVE-2016-1687 | MEDIUM | 6.5 | 3.6 | 05.06.2016 23:59 | ||
CVE-2016-1688 | MEDIUM | 6.5 | 3.6 | 05.06.2016 23:59 | ||
CVE-2016-1689 | MEDIUM | 6.5 | 3.6 | 05.06.2016 23:59 | ||
CVE-2016-1690 | HIGH | 7.5 | 5.9 | 05.06.2016 23:59 | ||
CVE-2016-1691 | HIGH | 7.5 | 5.9 | 05.06.2016 23:59 | ||
CVE-2016-1692 | MEDIUM | 5.3 | 1.4 | 05.06.2016 23:59 | ||
CVE-2016-1693 | MEDIUM | 5.3 | 3.6 | 05.06.2016 23:59 | ||
CVE-2016-1694 | MEDIUM | 5.3 | 3.6 | 05.06.2016 23:59 | ||
CVE-2016-1695 | HIGH | 8.8 | 5.9 | 05.06.2016 23:59 | ||
CVE-2016-1696 | HIGH | 8.8 | 5.9 | 05.06.2016 23:59 | ||
CVE-2016-1697 | HIGH | 8.8 | 5.9 | 05.06.2016 23:59 | ||
CVE-2016-1698 | MEDIUM | 6.5 | 3.6 | 05.06.2016 23:59 | ||
CVE-2016-1699 | MEDIUM | 6.5 | 3.6 | 05.06.2016 23:59 | ||
CVE-2016-1700 | HIGH | 7.5 | 5.9 | 05.06.2016 23:59 | ||
CVE-2016-1701 | HIGH | 8.8 | 5.9 | 05.06.2016 23:59 | ||
CVE-2016-1702 | MEDIUM | 6.5 | 3.6 | 05.06.2016 23:59 | ||
CVE-2016-1703 | HIGH | 8.8 | 5.9 | 05.06.2016 23:59 | ||
CVE-2016-1960 | HIGH | 8.8 | 5.9 | 13.03.2016 18:59 | ||
CVE-2016-1961 | HIGH | 8.8 | 5.9 | 13.03.2016 18:59 | ||
CVE-2016-1964 | HIGH | 8.8 | 5.9 | 13.03.2016 18:59 | ||
CVE-2016-1974 | HIGH | 8.8 | 5.9 | 13.03.2016 18:59 | ||
CVE-2016-1977 | HIGH | 8.8 | 5.9 | 13.03.2016 18:59 | ||
CVE-2016-2178 | MEDIUM | 5.5 | 3.6 | 20.06.2016 01:59 | ||
CVE-2016-2315 | CRITICAL | 9.8 | 5.9 | 08.04.2016 14:59 | ||
CVE-2016-2324 | CRITICAL | 9.8 | 5.9 | 08.04.2016 14:59 | ||
CVE-2016-2790 | HIGH | 8.8 | 5.9 | 13.03.2016 18:59 | ||
CVE-2016-2791 | HIGH | 8.8 | 5.9 | 13.03.2016 18:59 | ||
CVE-2016-2792 | HIGH | 8.8 | 5.9 | 13.03.2016 18:59 | ||
CVE-2016-2793 | HIGH | 8.8 | 5.9 | 13.03.2016 18:59 | ||
CVE-2016-2794 | HIGH | 8.8 | 5.9 | 13.03.2016 18:59 | ||
CVE-2016-2795 | HIGH | 8.8 | 5.9 | 13.03.2016 18:59 | ||
CVE-2016-2796 | HIGH | 8.8 | 5.9 | 13.03.2016 18:59 | ||
CVE-2016-2797 | HIGH | 8.8 | 5.9 | 13.03.2016 18:59 | ||
CVE-2016-2798 | HIGH | 8.8 | 5.9 | 13.03.2016 18:59 | ||
CVE-2016-2799 | HIGH | 8.8 | 5.9 | 13.03.2016 18:59 | ||
CVE-2016-2800 | HIGH | 8.8 | 5.9 | 13.03.2016 18:59 | ||
CVE-2016-2801 | HIGH | 8.8 | 5.9 | 13.03.2016 18:59 | ||
CVE-2016-2802 | HIGH | 8.8 | 5.9 | 13.03.2016 18:59 | ||
CVE-2016-2806 | HIGH | 8.8 | 5.9 | 30.04.2016 17:59 | ||
CVE-2016-2807 | HIGH | 8.8 | 5.9 | 30.04.2016 17:59 | ||
CVE-2016-3714 | HIGH | 8.4 | 5.9 | 05.05.2016 18:59 | ||
CVE-2016-5131 | HIGH | 8.8 | 5.9 | 23.07.2016 19:59 | ||
CVE-2016-5244 | HIGH | 7.5 | 3.6 | 27.06.2016 10:59 | ||
CVE-2016-5325 | MEDIUM | 6.1 | 2.7 | 10.10.2016 16:59 | ||
CVE-2016-7099 | MEDIUM | 5.9 | 3.6 | 10.10.2016 16:59 | ||
CVE-2016-7966 | HIGH | 7.3 | 3.4 | 23.12.2016 22:59 | ||
CVE-2016-8568 | MEDIUM | 5.5 | 3.6 | 03.02.2017 15:59 | ||
CVE-2016-8569 | MEDIUM | 5.5 | 3.6 | 03.02.2017 15:59 | ||
CVE-2016-9398 | HIGH | 7.5 | 3.6 | 23.03.2017 18:59 | ||
CVE-2016-9957 | HIGH | 7.8 | 5.9 | 12.04.2017 20:59 | ||
CVE-2016-9958 | HIGH | 7.8 | 5.9 | 12.04.2017 20:59 | ||
CVE-2016-9959 | HIGH | 7.8 | 5.9 | 12.04.2017 20:59 | ||
CVE-2017-1000366 | HIGH | 7.8 | 5.9 | 19.06.2017 16:29 | ||
CVE-2017-13077 | MEDIUM | 6.8 | 5.2 | 17.10.2017 02:29 | ||
CVE-2017-13078 | MEDIUM | 5.3 | 3.6 | 17.10.2017 13:29 | ||
CVE-2017-13079 | MEDIUM | 5.3 | 3.6 | 17.10.2017 13:29 | ||
CVE-2017-13080 | MEDIUM | 5.3 | 3.6 | 17.10.2017 13:29 | ||
CVE-2017-13081 | MEDIUM | 5.3 | 3.6 | 17.10.2017 13:29 | ||
CVE-2017-13082 | HIGH | 8.1 | 5.2 | 17.10.2017 13:29 | ||
CVE-2017-13084 | MEDIUM | 6.8 | 5.2 | 17.10.2017 13:29 | ||
CVE-2017-13086 | MEDIUM | 6.8 | 5.2 | 17.10.2017 13:29 | ||
CVE-2017-13087 | MEDIUM | 5.3 | 3.6 | 17.10.2017 13:29 | ||
CVE-2017-13088 | MEDIUM | 5.3 | 3.6 | 17.10.2017 13:29 | ||
CVE-2017-14491 | CRITICAL | 9.8 | 5.9 | 04.10.2017 01:29 | ||
CVE-2017-16232 | HIGH | 7.5 | 3.6 | 21.03.2019 15:59 | ||
CVE-2017-17805 | HIGH | 7.8 | 5.9 | 20.12.2017 23:29 | ||
CVE-2017-17806 | HIGH | 7.8 | 5.9 | 20.12.2017 23:29 | ||
CVE-2017-18017 | CRITICAL | 9.8 | 5.9 | 03.01.2018 06:29 | ||
CVE-2017-5753 | MEDIUM | 5.6 | 4.0 | 04.01.2018 13:29 | ||
CVE-2018-10195 | HIGH | 7.1 | 5.2 | 02.06.2021 14:15 | ||
CVE-2018-12116 | HIGH | 7.5 | 3.6 | 28.11.2018 17:29 | ||
CVE-2018-12122 | HIGH | 7.5 | 3.6 | 28.11.2018 17:29 | ||
CVE-2018-17962 | HIGH | 7.5 | 3.6 | 09.10.2018 22:29 | ||
CVE-2018-18584 | MEDIUM | 6.5 | 3.6 | 23.10.2018 02:29 | ||
CVE-2018-18585 | MEDIUM | 4.3 | 1.4 | 23.10.2018 02:29 | ||
CVE-2018-18873 | MEDIUM | 5.5 | 3.6 | 31.10.2018 16:29 | ||
CVE-2018-19052 | HIGH | 7.5 | 3.6 | 07.11.2018 05:29 | ||
CVE-2018-19539 | MEDIUM | 6.5 | 3.6 | 26.11.2018 03:29 | ||
CVE-2018-19540 | HIGH | 8.8 | 5.9 | 26.11.2018 03:29 | ||
CVE-2018-19541 | HIGH | 8.8 | 5.9 | 26.11.2018 03:29 | ||
CVE-2018-19542 | MEDIUM | 6.5 | 3.6 | 26.11.2018 03:29 | ||
CVE-2018-19543 | HIGH | 7.8 | 5.9 | 26.11.2018 03:29 | ||
CVE-2018-19655 | HIGH | 8.8 | 5.9 | 29.11.2018 05:29 | ||
CVE-2018-7566 | HIGH | 7.8 | 5.9 | 30.03.2018 21:29 | ||
CVE-2019-11038 | MEDIUM | 5.3 | 1.4 | 19.06.2019 00:15 | ||
CVE-2019-18897 | HIGH | 7.8 | 5.9 | 02.03.2020 16:15 | ||
CVE-2019-18901 | MEDIUM | 5.5 | 3.6 | 02.03.2020 16:15 | ||
CVE-2019-18902 | CRITICAL | 9.8 | 5.9 | 02.03.2020 17:15 | ||
CVE-2019-18903 | CRITICAL | 9.8 | 5.9 | 02.03.2020 17:15 | ||
CVE-2020-14147 | HIGH | 7.7 | 4.0 | 15.06.2020 18:15 | ||
CVE-2020-15705 | MEDIUM | 6.4 | 5.9 | 29.07.2020 18:15 | ||
CVE-2020-15706 | MEDIUM | 6.4 | 5.9 | 29.07.2020 18:15 | ||
CVE-2020-15707 | MEDIUM | 6.4 | 5.9 | 29.07.2020 18:15 | ||
CVE-2020-5504 | HIGH | 8.8 | 5.9 | 09.01.2020 22:15 | ||
CVE-2020-6422 | HIGH | 8.8 | 5.9 | 23.03.2020 16:15 | ||
CVE-2020-6424 | HIGH | 8.8 | 5.9 | 23.03.2020 16:15 | ||
CVE-2020-6426 | MEDIUM | 6.5 | 3.6 | 23.03.2020 16:15 | ||
CVE-2020-6427 | HIGH | 8.8 | 5.9 | 23.03.2020 16:15 | ||
CVE-2020-6428 | HIGH | 8.8 | 5.9 | 23.03.2020 16:15 | ||
CVE-2020-6429 | HIGH | 8.8 | 5.9 | 23.03.2020 16:15 | ||
CVE-2020-6449 | HIGH | 8.8 | 5.9 | 23.03.2020 16:15 | ||
CVE-2020-8013 | LOW | 2.5 | 1.4 | 02.03.2020 17:15 | ||
CVE-2021-32000 | HIGH | 7.1 | 5.2 | 28.07.2021 10:15 | ||
CVE-2021-4166 | HIGH | 7.1 | 5.2 | 25.12.2021 19:15 | ||
CVE-2021-41817 | HIGH | 7.5 | 3.6 | 01.01.2022 05:15 | ||
CVE-2021-41819 | HIGH | 7.5 | 3.6 | 01.01.2022 06:15 | ||
CVE-2022-27239 | HIGH | 7.8 | 5.9 | 27.04.2022 14:15 | ||
CVE-2022-31252 | MEDIUM | 4.4 | 2.5 | 06.10.2022 18:16 | ||
CVE-2022-45153 | HIGH | 7.8 | 5.9 | 15.02.2023 10:15 | ||
CVE-2023-34256 | MEDIUM | 5.5 | 3.6 | 31.05.2023 20:15 |
References ?
No references are available for this certificate.
Updates ?
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
{'_type': 'Set', 'elements': ['cpe:2.3:o:suse:linux_enterprise:12.0:sp5:*:*:*:*:*:*']}
values added. - The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2015-8776', 'CVE-2016-2798', 'CVE-2016-1974', 'CVE-2016-2791', 'CVE-2016-1675', 'CVE-2016-1655', 'CVE-2016-1964', 'CVE-2016-1702', 'CVE-2011-3172', 'CVE-2016-1677', 'CVE-2016-1659', 'CVE-2016-1680', 'CVE-2016-1652', 'CVE-2016-1700', 'CVE-2015-8779', 'CVE-2020-5504', 'CVE-2016-5131', 'CVE-2016-1691', 'CVE-2016-2794', 'CVE-2016-0264', 'CVE-2016-3714', 'CVE-2015-8778', 'CVE-2016-1679', 'CVE-2016-5325', 'CVE-2016-1687', 'CVE-2016-1697', 'CVE-2016-2793', 'CVE-2016-1692', 'CVE-2016-1686', 'CVE-2016-1688', 'CVE-2015-5041', 'CVE-2020-14147', 'CVE-2016-1674', 'CVE-2016-1678', 'CVE-2016-2178', 'CVE-2016-1695', 'CVE-2018-17962', 'CVE-2016-1672', 'CVE-2016-2806', 'CVE-2016-2802', 'CVE-2016-2799', 'CVE-2016-1699', 'CVE-2016-1685', 'CVE-2016-1673', 'CVE-2016-1689', 'CVE-2016-2801', 'CVE-2016-2807', 'CVE-2016-1681', 'CVE-2019-11038', 'CVE-2014-9761', 'CVE-2016-2797', 'CVE-2016-8568', 'CVE-2016-2792', 'CVE-2016-1654', 'CVE-2023-34256', 'CVE-2016-1694', 'CVE-2021-41817', 'CVE-2016-1701', 'CVE-2016-1653', 'CVE-2016-7966', 'CVE-2016-2795', 'CVE-2016-2796', 'CVE-2015-8816', 'CVE-2016-1690', 'CVE-2016-8569', 'CVE-2016-1693', 'CVE-2015-1241', 'CVE-2021-4166', 'CVE-2016-1698', 'CVE-2016-1683', 'CVE-2021-41819', 'CVE-2016-1961', 'CVE-2016-1656', 'CVE-2016-1651', 'CVE-2016-1682', 'CVE-2016-1977', 'CVE-2016-5244', 'CVE-2015-5300', 'CVE-2016-1960', 'CVE-2016-1696', 'CVE-2016-1676', 'CVE-2016-2790', 'CVE-2016-2800', 'CVE-2017-16232', 'CVE-2016-1703', 'CVE-2016-7099', 'CVE-2015-5239']}
values added.
- The cpe_matches property was updated, with the
-
01.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2015-8779', 'CVE-2015-5300', 'CVE-2016-5244', 'CVE-2015-8776', 'CVE-2015-5041', 'CVE-2017-16232', 'CVE-2016-3714', 'CVE-2015-8778', 'CVE-2020-5504', 'CVE-2018-17962', 'CVE-2019-11038', 'CVE-2014-9761', 'CVE-2011-3172', 'CVE-2016-0264', 'CVE-2015-5239']}
values discarded.
- The related_cves property was updated, with the
-
18.05.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2017-13086', 'CVE-2016-9957', 'CVE-2016-2315', 'CVE-2016-9958', 'CVE-2015-8776', 'CVE-2018-7566', 'CVE-2017-13081', 'CVE-2017-13084', 'CVE-2015-7976', 'CVE-2016-3714', 'CVE-2015-8778', 'CVE-2017-13078', 'CVE-2019-18903', 'CVE-2017-13088', 'CVE-2020-6422', 'CVE-2020-6424', 'CVE-2015-4000', 'CVE-2020-8013', 'CVE-2014-2978', 'CVE-2017-13079', 'CVE-2017-14491', 'CVE-2017-13077', 'CVE-2020-6428', 'CVE-2014-9854', 'CVE-2015-7547', 'CVE-2014-2977', 'CVE-2019-18901', 'CVE-2015-2738', 'CVE-2018-12122', 'CVE-2015-3340', 'CVE-2014-9761', 'CVE-2016-1602', 'CVE-2011-3172', 'CVE-2020-6429', 'CVE-2015-5154', 'CVE-2015-5300', 'CVE-2016-2324', 'CVE-2019-18902', 'CVE-2015-5041', 'CVE-2018-12116', 'CVE-2017-13080', 'CVE-2017-13087', 'CVE-2015-2734', 'CVE-2017-13082', 'CVE-2015-8779', 'CVE-2015-2737', 'CVE-2019-18897', 'CVE-2020-6426', 'CVE-2020-5504', 'CVE-2020-6449', 'CVE-2014-9116', 'CVE-2020-6427', 'CVE-2016-9959', 'CVE-2015-5239']}
values added.
- The related_cves property was updated, with the
-
19.03.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2017-13086', 'CVE-2016-9957', 'CVE-2016-9958', 'CVE-2016-2315', 'CVE-2015-8776', 'CVE-2018-7566', 'CVE-2015-7976', 'CVE-2016-3714', 'CVE-2017-13081', 'CVE-2017-13084', 'CVE-2015-8778', 'CVE-2017-13078', 'CVE-2019-18903', 'CVE-2017-13088', 'CVE-2020-6424', 'CVE-2020-6422', 'CVE-2015-4000', 'CVE-2020-8013', 'CVE-2017-13079', 'CVE-2014-2978', 'CVE-2017-14491', 'CVE-2017-13077', 'CVE-2020-6428', 'CVE-2014-9854', 'CVE-2015-7547', 'CVE-2014-2977', 'CVE-2019-18901', 'CVE-2015-2738', 'CVE-2018-12122', 'CVE-2015-3340', 'CVE-2014-9761', 'CVE-2016-1602', 'CVE-2011-3172', 'CVE-2020-6429', 'CVE-2015-5154', 'CVE-2015-5300', 'CVE-2016-2324', 'CVE-2019-18902', 'CVE-2015-5041', 'CVE-2018-12116', 'CVE-2017-13080', 'CVE-2017-13087', 'CVE-2015-2734', 'CVE-2017-13082', 'CVE-2015-8779', 'CVE-2015-2737', 'CVE-2019-18897', 'CVE-2020-6426', 'CVE-2020-5504', 'CVE-2020-6449', 'CVE-2014-9116', 'CVE-2020-6427', 'CVE-2016-9959', 'CVE-2015-5239']}
values discarded.
- The related_cves property was updated, with the
-
26.02.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2022-45153']}
values added.
- The related_cves property was updated, with the
-
09.02.2023 The certificate data changed.
Certificate changed
The cert_id was updated.
- The new value is
3216
.
The web extraction data was updated.
- The following values were inserted:
{'validation_history': [{'_type': 'sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry', 'date': '2018-07-03', 'validation_type': 'Initial', 'lab': 'ATSEC INFORMATION SECURITY CORP'}], 'vendor_url': 'http://www.suse.com', 'certificate_pdf_url': 'https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/JulyConsolidatedCert.pdf', 'hw_versions': None, 'fw_versions': None}
. - The standard property was set to
FIPS 140-2
. - The status property was set to
historical
. - The level property was set to
1
. - The embodiment property was set to
Multi-Chip Stand Alone
. - The following properties were deleted:
['date_validation', 'algorithms', 'vendor_www', 'lab', 'lab_nvlap', 'security_policy_www', 'certificate_www', 'hw_version', 'fw_version', 'product_url']
.
The PDF extraction data was updated.
- The following values were inserted:
{'policy_metadata': {'pdf_file_size_bytes': 333595, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 32, '/Title': 'FIPS 140-2 Non-Proprietary Security Policy', '/Author': 'CMVP', '/Subject': 'SUSE Linux Enterprise Server 12 - NSS Module', '/Creator': 'Writer', '/Producer': 'LibreOffice 5.4', '/CreationDate': "D:20180417075600-05'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://csrc.nist.gov/publications/PubsFIPS.html', 'http://crypto.stanford.edu/~dabo/abstracts/ssl-timing.html', 'http://www.cryptography.com/timingattack/', 'http://csrc.nist.gov/groups/STM/cmvp/standards.html', 'http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38F.pdf', 'http://www.daemonology.net/papers/htt.pdf', 'http://www.cryptsoft.com/pkcs11doc/STANDARD/pkcs-11v2-20.pdf']}}}
. - The following properties were deleted:
['cert_id', 'algorithms', 'clean_cert_ids', 'st_metadata']
.
The computed heuristics were updated.
- The following values were inserted:
{'policy_prunned_references': {'_type': 'Set', 'elements': []}, 'module_prunned_references': {'_type': 'Set', 'elements': []}, 'policy_processed_references': {'_type': 'sec_certs.sample.certificate.References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'module_processed_references': {'_type': 'sec_certs.sample.certificate.References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'direct_transitive_cves': None, 'indirect_transitive_cves': None}
. - The algorithms property was set to
{'_type': 'Set', 'elements': ['DSA#1309', 'DRBG#1825', 'SHS#4070', 'AES#5003', 'KTS#5003', 'Triple-DES#2581', 'RSA#2697', 'HMAC#3325', 'ECDSA#1273', 'ECDSA#1272', 'CVL#1556', 'KTS#5004', 'DSA#1310', 'Triple-DES#2580', 'Triple-DES#2582', 'RSA#2699', 'AES#5005', 'DRBG#1826', 'ECDSA#1274', 'CVL#1555', 'HMAC#3326', 'SHS#4069', 'AES#5004', 'HMAC#3327', 'CVL#1554', 'SHS#4068', 'CVL#1553', 'KTS#5005', 'DRBG#1824', 'CVL#1552', 'RSA#2698', 'CVL#1551', 'DSA#1311']}
. - The following properties were deleted:
['keywords', 'unmatched_algs', 'clean_cert_ids', 'st_references', 'web_references']
.
The state was updated.
- The following values were inserted:
{'module_download_ok': True, 'policy_download_ok': True, 'policy_convert_garbage': False, 'policy_convert_ok': True, 'module_extract_ok': True, 'policy_extract_ok': True, 'policy_pdf_hash': 'f1756abe7d16b905f9b78b2ee14cddaae9254695b036f3d10ad187e35750ca19', 'policy_txt_hash': 'ad8338830530a99cf06b9f40b09176144e6d83bf2a1350362f9e83ff0c06f159'}
. - The following properties were deleted:
['sp_path', 'html_path', 'tables_done', 'file_status', 'txt_state']
.
- The new value is
-
05.11.2022 The certificate data changed.
Certificate changed
The web extraction data was updated.
- The algorithms property was set to
{'_type': 'Set', 'elements': []}
.
The computed heuristics were updated.
- The algorithms property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#4069', 'algorithm_type': 'SHS', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1311', 'algorithm_type': 'DSA', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1826', 'algorithm_type': 'DRBG', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#5004', 'algorithm_type': 'KTS', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#4068', 'algorithm_type': 'SHS', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1553', 'algorithm_type': 'CVL', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#2699', 'algorithm_type': 'RSA', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#3325', 'algorithm_type': 'HMAC', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1273', 'algorithm_type': 'ECDSA', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1555', 'algorithm_type': 'CVL', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1551', 'algorithm_type': 'CVL', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#5003', 'algorithm_type': 'AES', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1272', 'algorithm_type': 'ECDSA', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1554', 'algorithm_type': 'CVL', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1310', 'algorithm_type': 'DSA', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#3327', 'algorithm_type': 'HMAC', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#2697', 'algorithm_type': 'RSA', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#5003', 'algorithm_type': 'KTS', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1274', 'algorithm_type': 'ECDSA', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1824', 'algorithm_type': 'DRBG', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#4070', 'algorithm_type': 'SHS', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1552', 'algorithm_type': 'CVL', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1309', 'algorithm_type': 'DSA', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1556', 'algorithm_type': 'CVL', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#2581', 'algorithm_type': 'Triple-DES', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#2580', 'algorithm_type': 'Triple-DES', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#5005', 'algorithm_type': 'AES', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#2582', 'algorithm_type': 'Triple-DES', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#3326', 'algorithm_type': 'HMAC', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#2698', 'algorithm_type': 'RSA', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1825', 'algorithm_type': 'DRBG', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#5005', 'algorithm_type': 'KTS', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#5004', 'algorithm_type': 'AES', 'vendor': None, 'implementation': None, 'date': None}]}
values discarded.
- The algorithms property was set to
-
25.10.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The keywords property was updated, with the
{'fips_cert_id': {'__update__': {'Cert': {'__delete__': ['#1']}}}, 'fips_certlike': {'__update__': {'Certlike': {'__update__': {'SHA-1': 3, 'SHA-224': 3, 'SHA-384': 3, 'SHA-512': 3, 'PKCS #11': 6}, '__delete__': ['SHA- 256', 'DSA 2048', 'Certificate RSA', '#2699 RSA']}}}, 'vendor': {}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 10}, '__delete__': ['AES-']}, 'RC': {'__delete__': ['RC4']}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 4}, '__delete__': ['DEA']}, '3DES': {'__update__': {'Triple-DES': 6}}}}, 'constructions': {'__update__': {'MAC': {'__update__': {'HMAC': 16}}}}}}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECDSA': {'__update__': {'ECDSA': 5}}}}, 'FF': {'__update__': {'DH': {'__update__': {'Diffie-Hellman': 13}}, 'DSA': {'__update__': {'DSA': 16}}}}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA1': {'__update__': {'SHA-1': 3}}, 'SHA2': {'__update__': {'SHA-224': 3, 'SHA-384': 3, 'SHA-512': 3}, '__delete__': ['SHA-2']}}, '__delete__': ['SHA3']}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 1}}}, '__delete__': ['KA', 'PAKE']}, 'randomness': {'__update__': {'PRNG': {'__update__': {'DRBG': 19}}, 'RNG': {'__update__': {'RNG': 1}, '__delete__': ['RBG']}}}, 'cipher_mode': {'__update__': {'GCM': {'__update__': {'GCM': 3}}}}, 'crypto_library': {'__update__': {'NSS': {'__update__': {'NSS': 43}}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'timing attacks': 1}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'FIPS': {'__delete__': ['FIPS 186']}, 'NIST': {'SP 800-135': 1, 'SP 800-38F': 1, 'SP 800-90A': 10, 'NIST SP 800-67': 1, 'NIST SP 800-38A': 1, 'NIST SP 800-38D': 1, 'NIST SP 800-38F': 1, 'NIST SP 800-56A': 1, 'NIST SP 800-90A': 1}, 'PKCS': {'__update__': {'PKCS #11': 3}}}}}
data. - The algorithms property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '00000051', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': 'C4', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 4096', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '38', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 186', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 256', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 224', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1556', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1825', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 15360', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 1', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '521', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '2048', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1273', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#2581', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1310', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '384', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '9', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1274', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1309', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#5005', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 800', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '90', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#4068', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '2570', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#3327', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '2', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#4069', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1552', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#4070', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 3072', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '224', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#5004', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#3325', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1824', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 4', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#2699', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 140', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#2580', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '512', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 2048', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '5', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#2697', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 0', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 2', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1553', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 168', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '800', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1311', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 12', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#3326', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#5003', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1551', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '400', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1272', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': 'A 2048', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1555', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': 'C5', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#2582', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 1024', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 160', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1554', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 128', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '135', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '1', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '13', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#2698', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 112', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 800', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 192', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': 'C2', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1826', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '256', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}]}
.
The computed heuristics were updated.
- The algorithms property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '00000051', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': 'C4', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 4096', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '38', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 186', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 256', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 224', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1556', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1825', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 15360', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 1', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '521', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '2048', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1273', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#2581', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1310', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '384', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '9', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1274', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1309', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#5005', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 800', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '90', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#4068', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '2570', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#3327', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '2', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#4069', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1552', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#4070', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 3072', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '224', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#5004', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#3325', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1824', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 4', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#2699', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 140', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#2580', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '512', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 2048', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '5', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#2697', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 0', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 2', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1553', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 168', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '800', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1311', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 12', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#3326', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#5003', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1551', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '400', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1272', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': 'A 2048', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1555', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': 'C5', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#2582', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 1024', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 160', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1554', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 128', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '135', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '1', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '13', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#2698', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 112', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 800', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': ' 192', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': 'C2', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1826', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '256', 'algorithm_type': None, 'vendor': None, 'implementation': None, 'date': None}]}
values added.
The state was updated.
- The tables_done property was set to
True
.
- The keywords property was updated, with the
-
10.10.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was set to
{'_type': 'Set', 'elements': ['cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:*:*:*:*', 'cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:-:sap:*:*', 'cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp2:*:*:*:*:*:*', 'cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp4:*:*:*:*:*:*', 'cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:sap:*:*', 'cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:business_critical_linux:-:*:*', 'cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:*:sap:*:*', 'cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:espos:*:*:*', 'cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:ltss:*:*:*', 'cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:*:*:*:*', 'cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:-:-:*:*', 'cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:*:sap:*:*', 'cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp2:*:*:*:*:raspberry_pi:*', 'cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp3:*:*:*:*:*:*', 'cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:*:*', 'cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:business_critical_linux:-:*:*', 'cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:*:*:*:*', 'cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:ltss:*:*:*', 'cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:espos:*:*:*', 'cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:ltss:*:*:*', 'cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:raspberry_pi:*']}
. - The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2017-13086', 'CVE-2020-15705', 'CVE-2015-8776', 'CVE-2020-6422', 'CVE-2020-15707', 'CVE-2014-9854', 'CVE-2011-3172', 'CVE-2018-19541', 'CVE-2017-18017', 'CVE-2018-19539', 'CVE-2018-12116', 'CVE-2015-2734', 'CVE-2022-27239', 'CVE-2015-8779', 'CVE-2015-2737', 'CVE-2020-5504', 'CVE-2016-0264', 'CVE-2016-2315', 'CVE-2018-7566', 'CVE-2015-8778', 'CVE-2016-3714', 'CVE-2017-13078', 'CVE-2020-6424', 'CVE-2017-13088', 'CVE-2018-18585', 'CVE-2017-13077', 'CVE-2017-17806', 'CVE-2015-7547', 'CVE-2014-2977', 'CVE-2017-1000366', 'CVE-2018-12122', 'CVE-2016-1602', 'CVE-2018-19543', 'CVE-2016-2324', 'CVE-2015-5041', 'CVE-2020-15706', 'CVE-2022-31252', 'CVE-2018-18873', 'CVE-2018-10195', 'CVE-2020-6426', 'CVE-2018-17962', 'CVE-2017-17805', 'CVE-2016-9959', 'CVE-2016-9957', 'CVE-2016-9958', 'CVE-2016-9398', 'CVE-2017-13081', 'CVE-2017-13084', 'CVE-2015-7976', 'CVE-2015-4000', 'CVE-2014-2978', 'CVE-2017-13079', 'CVE-2017-14491', 'CVE-2015-2738', 'CVE-2019-11038', 'CVE-2014-9761', 'CVE-2020-6429', 'CVE-2015-5154', 'CVE-2017-13080', 'CVE-2015-4680', 'CVE-2020-6449', 'CVE-2014-9116', 'CVE-2020-6428', 'CVE-2018-19540', 'CVE-2015-3340', 'CVE-2014-3673', 'CVE-2018-19542', 'CVE-2018-19052', 'CVE-2016-5244', 'CVE-2015-5300', 'CVE-2017-5753', 'CVE-2018-18584', 'CVE-2017-13087', 'CVE-2017-13082', 'CVE-2017-16232', 'CVE-2018-19655', 'CVE-2021-32000', 'CVE-2020-6427']}
values added.
- The cpe_matches property was set to
-
08.10.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cpe_matches property was updated, with the
{'_type': 'Set', 'elements': ['cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*', 'cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*', 'cpe:2.3:o:suse:suse_linux_enterprise_server:12:-:*:*:*:*:*:*']}
values discarded. - The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2015-0374', 'CVE-2016-0668', 'CVE-2014-6463']}
values added.
- The cpe_matches property was updated, with the
-
18.09.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2014-6474', 'CVE-2014-6568']}
values added.
- The related_cves property was updated, with the
-
17.09.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2014-6551']}
values added.
- The related_cves property was updated, with the
-
03.09.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2014-4207', 'CVE-2016-0642', 'CVE-2014-6559', 'CVE-2014-4287', 'CVE-2014-0198', 'CVE-2015-0381', 'CVE-2010-5298', 'CVE-2014-6564', 'CVE-2015-0382', 'CVE-2014-6507', 'CVE-2014-2494', 'CVE-2014-6494', 'CVE-2014-0221', 'CVE-2014-6478', 'CVE-2014-6520', 'CVE-2014-6505', 'CVE-2014-6495', 'CVE-2016-0651', 'CVE-2014-6496', 'CVE-2015-0432', 'CVE-2014-3470', 'CVE-2015-0391', 'CVE-2014-6464', 'CVE-2014-6484']}
values added.
- The related_cves property was updated, with the
-
31.07.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2014-4260']}
values added.
- The related_cves property was updated, with the
-
20.07.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2014-4258', 'CVE-2014-6555', 'CVE-2014-6530']}
values added.
- The related_cves property was updated, with the
-
17.07.2022 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.fips.FIPSCertificate
.
The computed heuristics were updated.
- The following values were inserted:
{'clean_cert_ids': {}}
. - The _type property was set to
sec_certs.sample.fips.FIPSCertificate.Heuristics
. - The keywords property was set to
{}
. - The algorithms property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#4069', 'algorithm_type': 'SHS', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1311', 'algorithm_type': 'DSA', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1826', 'algorithm_type': 'DRBG', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#5004', 'algorithm_type': 'KTS', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#4068', 'algorithm_type': 'SHS', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1553', 'algorithm_type': 'CVL', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#2699', 'algorithm_type': 'RSA', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#3325', 'algorithm_type': 'HMAC', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1273', 'algorithm_type': 'ECDSA', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1555', 'algorithm_type': 'CVL', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#5003', 'algorithm_type': 'AES', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1551', 'algorithm_type': 'CVL', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1272', 'algorithm_type': 'ECDSA', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1554', 'algorithm_type': 'CVL', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1310', 'algorithm_type': 'DSA', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#3327', 'algorithm_type': 'HMAC', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#2697', 'algorithm_type': 'RSA', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#5003', 'algorithm_type': 'KTS', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1824', 'algorithm_type': 'DRBG', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1274', 'algorithm_type': 'ECDSA', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#4070', 'algorithm_type': 'SHS', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1552', 'algorithm_type': 'CVL', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1309', 'algorithm_type': 'DSA', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1556', 'algorithm_type': 'CVL', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#2581', 'algorithm_type': 'Triple-DES', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#2580', 'algorithm_type': 'Triple-DES', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#5005', 'algorithm_type': 'AES', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#2582', 'algorithm_type': 'Triple-DES', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#3326', 'algorithm_type': 'HMAC', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#2698', 'algorithm_type': 'RSA', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#1825', 'algorithm_type': 'DRBG', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#5005', 'algorithm_type': 'KTS', 'vendor': None, 'implementation': None, 'date': None}, {'_type': 'sec_certs.sample.fips_algorithm.FIPSAlgorithm', 'cert_id': '#5004', 'algorithm_type': 'AES', 'vendor': None, 'implementation': None, 'date': None}]}
. - The st_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The web_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data.
The state was updated.
- The _type property was set to
sec_certs.sample.fips.FIPSCertificate.InternalState
. - The following properties were deleted:
['fragment_path']
.
- The new value is
-
07.07.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2015-1283']}
values added.
- The related_cves property was updated, with the
-
02.07.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The status property was set to
Historical
. - The date_sunset property was set to
None
. - The historical_reason property was set to
SP 800-56Arev3 transition
.
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2014-6469']}
values added.
- The status property was set to
-
29.06.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
-
25.06.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
-
23.06.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
-
21.06.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
-
14.06.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The pdf_scan was updated.
- The keywords property was updated, with the
{'rules_cert_id': {}, 'rules_standard_id': {'__update__': {'FIPS ?(?:PUB )?[0-9]+-[0-9]+?': {'__delete__': ['FIPS 140-2', 'FIPS140-2', 'FIPS186-4', 'FIPS 180-4', 'FIPS 198-1']}, 'NIST SP [0-9]+-[0-9]+?[a-zA-Z]?': {'__delete__': ['NIST SP 800-67', 'NIST SP 800-38A', 'NIST SP 800-38D', 'NIST SP 800-38F', 'NIST SP 800-56A']}, 'PKCS[ #]*[1-9]+': {'__update__': {'PKCS #11': {'__update__': {'count': 1}}}, '__delete__': ['PKCS#1']}}}, 'rules_block_cipher_modes': {'__update__': {'GCM': {'__update__': {'GCM': {'__update__': {'count': 1}}}}}}, 'rules_ecc_curves': {'__insert__': {'(NIST)? ?[PBK]-[0-9]{3}': {'P-384': {'count': 1}}}, '__update__': {'(?:Curve |curve |)P-(192|224|256|384|521)': {'__delete__': ['P-256']}}}, 'rules_crypto_libs': {'__update__': {'NSS': {'__update__': {'NSS': {'__update__': {'count': 1}}}}}}, 'rules_other': {'__update__': {'library': {'__update__': {'library': {'__update__': {'count': 1}}}}}}}
data.
The computed heuristics were updated.
- The keywords property was updated, with the
{'rules_cert_id': {}, 'rules_standard_id': {'__update__': {'FIPS ?(?:PUB )?[0-9]+-[0-9]+?': {'__delete__': ['FIPS 140-2', 'FIPS140-2', 'FIPS186-4', 'FIPS 180-4', 'FIPS 198-1']}, 'NIST SP [0-9]+-[0-9]+?[a-zA-Z]?': {'__delete__': ['NIST SP 800-67', 'NIST SP 800-38A', 'NIST SP 800-38D', 'NIST SP 800-38F', 'NIST SP 800-56A']}, 'PKCS[ #]*[1-9]+': {'__update__': {'PKCS #11': {'__update__': {'count': 1}}}, '__delete__': ['PKCS#1']}}}, 'rules_block_cipher_modes': {'__update__': {'GCM': {'__update__': {'GCM': {'__update__': {'count': 1}}}}}}, 'rules_ecc_curves': {'__insert__': {'(NIST)? ?[PBK]-[0-9]{3}': {'P-384': {'count': 1}}}, '__update__': {'(?:Curve |curve |)P-(192|224|256|384|521)': {'__delete__': ['P-256']}}}, 'rules_crypto_libs': {'__update__': {'NSS': {'__update__': {'NSS': {'__update__': {'count': 1}}}}}}, 'rules_other': {'__update__': {'library': {'__update__': {'library': {'__update__': {'count': 1}}}}}}}
data. - The algorithms property was updated.
-
07.06.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
-
24.05.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
-
22.05.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
- The cpe_matches property was updated, with the
{'_type': 'Set', 'elements': ['cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*', 'cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*', 'cpe:2.3:o:suse:suse_linux_enterprise_server:12:-:*:*:*:*:*:*']}
values added. - The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2020-15705', 'CVE-2015-8776', 'CVE-2016-2798', 'CVE-2020-6422', 'CVE-2020-15707', 'CVE-2016-1974', 'CVE-2016-2791', 'CVE-2014-9854', 'CVE-2016-1675', 'CVE-2016-1655', 'CVE-2016-1964', 'CVE-2016-1702', 'CVE-2011-3172', 'CVE-2016-1677', 'CVE-2018-12116', 'CVE-2015-2734', 'CVE-2016-1659', 'CVE-2016-1680', 'CVE-2016-1652', 'CVE-2016-1700', 'CVE-2015-8779', 'CVE-2019-15624', 'CVE-2015-2737', 'CVE-2020-5504', 'CVE-2016-5131', 'CVE-2016-1691', 'CVE-2016-2794', 'CVE-2016-0264', 'CVE-2016-2315', 'CVE-2015-8778', 'CVE-2016-3714', 'CVE-2016-1679', 'CVE-2016-5325', 'CVE-2020-6424', 'CVE-2016-1687', 'CVE-2016-1697', 'CVE-2016-2793', 'CVE-2015-7547', 'CVE-2014-2977', 'CVE-2016-1692', 'CVE-2016-1686', 'CVE-2016-1602', 'CVE-2018-12122', 'CVE-2016-2324', 'CVE-2016-1688', 'CVE-2015-5041', 'CVE-2020-15706', 'CVE-2020-14147', 'CVE-2016-1674', 'CVE-2016-1678', 'CVE-2016-2178', 'CVE-2016-1695', 'CVE-2020-6426', 'CVE-2016-1672', 'CVE-2016-2806', 'CVE-2016-9959', 'CVE-2016-2802', 'CVE-2016-9957', 'CVE-2016-9958', 'CVE-2016-2799', 'CVE-2015-7976', 'CVE-2016-1699', 'CVE-2016-1685', 'CVE-2015-4000', 'CVE-2016-1673', 'CVE-2014-2978', 'CVE-2016-1689', 'CVE-2016-2801', 'CVE-2016-2807', 'CVE-2016-1681', 'CVE-2015-2738', 'CVE-2014-9761', 'CVE-2016-2797', 'CVE-2020-6429', 'CVE-2016-8568', 'CVE-2015-5154', 'CVE-2016-1654', 'CVE-2016-2792', 'CVE-2016-1694', 'CVE-2021-41817', 'CVE-2016-1701', 'CVE-2016-1653', 'CVE-2016-7966', 'CVE-2016-2795', 'CVE-2016-2796', 'CVE-2016-1690', 'CVE-2020-6449', 'CVE-2014-9116', 'CVE-2016-8569', 'CVE-2016-1693', 'CVE-2021-4166', 'CVE-2016-1698', 'CVE-2016-1683', 'CVE-2021-41819', 'CVE-2016-1961', 'CVE-2020-6428', 'CVE-2016-1656', 'CVE-2016-1651', 'CVE-2016-1682', 'CVE-2015-3340', 'CVE-2016-1977', 'CVE-2014-3673', 'CVE-2018-19052', 'CVE-2015-5300', 'CVE-2016-5244', 'CVE-2016-1960', 'CVE-2016-1696', 'CVE-2016-1676', 'CVE-2016-2790', 'CVE-2016-2800', 'CVE-2016-1703', 'CVE-2020-6427', 'CVE-2016-7099']}
values added.
-
20.05.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
-
19.05.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
-
18.05.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
-
17.05.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
-
13.05.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
-
18.04.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
-
11.03.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
-
10.03.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
-
09.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2021-45082']}
values added.
- The related_cves property was updated, with the
-
08.03.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
- The following properties were deleted:
['connections']
.
The pdf_scan was updated.
- The following properties were deleted:
['connections']
.
The computed heuristics were updated.
- The following values were inserted:
{'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'web_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}
. - The algorithms property was updated.
- The following properties were deleted:
['connections', 'directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting']
.
-
23.02.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
-
18.02.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
- The extracted_versions property was set to
{'_type': 'Set', 'elements': ['12']}
. - The cpe_matches property was set to
{'_type': 'Set', 'elements': ['cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*', 'cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:*:*:*:*']}
.
-
12.02.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
-
11.02.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
- The cpe_matches property was updated, with the
[[1, 'cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:*:*:*:*']]
values inserted.
-
03.02.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
-
02.02.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The module_type property was set to
Software
. - The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
- The related_cves property was updated, with the
{'_type': 'Set', 'elements': ['CVE-2016-2782']}
values added.
- The module_type property was set to
-
31.01.2022 The certificate data changed.
Certificate changed
The web_scan was updated.
- The algorithms property was updated.
The computed heuristics were updated.
- The algorithms property was updated.
-
30.01.2022 The certificate was first processed.
New certificate
A new FIPS 140 certificate with the product name was processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 3216,
"dgst": "7b31c40281e40541",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"DSA#1309",
"CVL#1552",
"DRBG#1826",
"SHS#4070",
"RSA#2697",
"CVL#1556",
"HMAC#3327",
"HMAC#3326",
"CVL#1551",
"DSA#1310",
"AES#5003",
"Triple-DES#2580",
"CVL#1555",
"ECDSA#1273",
"RSA#2698",
"SHS#4068",
"AES#5005",
"Triple-DES#2581",
"Triple-DES#2582",
"DRBG#1825",
"DSA#1311",
"CVL#1554",
"HMAC#3325",
"CVL#1553",
"RSA#2699",
"SHS#4069",
"ECDSA#1274",
"KTS#5003",
"ECDSA#1272",
"AES#5004",
"KTS#5004",
"DRBG#1824",
"KTS#5005"
]
},
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:espos:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp4:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:business_critical_linux:-:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:raspberry_pi:*",
"cpe:2.3:o:suse:linux_enterprise:12.0:sp5:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:espos:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:*:sap:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:ltss:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:sap:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:12:sp5:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp2:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp2:*:*:*:*:raspberry_pi:*",
"cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:-:-:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:-:sap:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:business_critical_linux:-:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:ltss:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:12:sp3:*:*:*:sap:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:12:sp4:*:*:ltss:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"12"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2015-0192",
"CVE-2015-2738",
"CVE-2020-6449",
"CVE-2016-1672",
"CVE-2011-3172",
"CVE-2017-13084",
"CVE-2015-3340",
"CVE-2016-1698",
"CVE-2016-1960",
"CVE-2016-2796",
"CVE-2016-1700",
"CVE-2016-8569",
"CVE-2016-2324",
"CVE-2016-0264",
"CVE-2016-9958",
"CVE-2016-1696",
"CVE-2018-19542",
"CVE-2018-12122",
"CVE-2017-13080",
"CVE-2015-8816",
"CVE-2015-5041",
"CVE-2016-3714",
"CVE-2018-19543",
"CVE-2016-2178",
"CVE-2018-19540",
"CVE-2016-1685",
"CVE-2020-6427",
"CVE-2021-32000",
"CVE-2015-5006",
"CVE-2016-1652",
"CVE-2016-1680",
"CVE-2015-5154",
"CVE-2016-1692",
"CVE-2019-11038",
"CVE-2020-5504",
"CVE-2016-1977",
"CVE-2016-1974",
"CVE-2017-13086",
"CVE-2020-15705",
"CVE-2018-17962",
"CVE-2020-8013",
"CVE-2014-3673",
"CVE-2015-8776",
"CVE-2016-1688",
"CVE-2016-5244",
"CVE-2016-1702",
"CVE-2015-8779",
"CVE-2014-9854",
"CVE-2021-4166",
"CVE-2014-9761",
"CVE-2016-2315",
"CVE-2016-1687",
"CVE-2016-1674",
"CVE-2016-5325",
"CVE-2016-2797",
"CVE-2016-1677",
"CVE-2016-1694",
"CVE-2021-41817",
"CVE-2020-6422",
"CVE-2015-8778",
"CVE-2020-14147",
"CVE-2017-13082",
"CVE-2017-17805",
"CVE-2019-18901",
"CVE-2016-2795",
"CVE-2016-2806",
"CVE-2016-1703",
"CVE-2017-17806",
"CVE-2018-12116",
"CVE-2016-1656",
"CVE-2015-7547",
"CVE-2016-1655",
"CVE-2018-19541",
"CVE-2016-1693",
"CVE-2016-9957",
"CVE-2020-6424",
"CVE-2016-9959",
"CVE-2016-1673",
"CVE-2017-1000366",
"CVE-2018-10195",
"CVE-2018-18584",
"CVE-2015-7976",
"CVE-2016-1701",
"CVE-2014-2978",
"CVE-2020-15706",
"CVE-2017-13079",
"CVE-2016-5131",
"CVE-2016-2801",
"CVE-2017-13077",
"CVE-2019-18902",
"CVE-2016-1678",
"CVE-2018-7566",
"CVE-2016-2792",
"CVE-2016-1654",
"CVE-2016-7099",
"CVE-2017-13078",
"CVE-2016-1699",
"CVE-2016-1651",
"CVE-2015-4000",
"CVE-2015-4680",
"CVE-2016-2807",
"CVE-2016-1679",
"CVE-2019-18897",
"CVE-2016-2791",
"CVE-2016-1697",
"CVE-2016-1961",
"CVE-2018-18873",
"CVE-2016-2793",
"CVE-2014-9116",
"CVE-2020-15707",
"CVE-2016-1676",
"CVE-2016-2799",
"CVE-2021-41819",
"CVE-2017-14491",
"CVE-2016-2802",
"CVE-2017-13087",
"CVE-2017-5753",
"CVE-2016-1683",
"CVE-2018-19539",
"CVE-2016-1686",
"CVE-2016-1659",
"CVE-2016-1689",
"CVE-2016-9398",
"CVE-2015-5300",
"CVE-2017-18017",
"CVE-2016-1675",
"CVE-2015-5239",
"CVE-2016-1691",
"CVE-2015-2734",
"CVE-2017-16232",
"CVE-2019-18903",
"CVE-2020-6426",
"CVE-2022-45153",
"CVE-2017-13081",
"CVE-2022-27239",
"CVE-2016-1690",
"CVE-2014-2977",
"CVE-2017-13088",
"CVE-2016-2798",
"CVE-2016-7966",
"CVE-2016-1964",
"CVE-2016-2790",
"CVE-2016-1681",
"CVE-2016-2794",
"CVE-2016-8568",
"CVE-2018-18585",
"CVE-2018-19052",
"CVE-2018-19655",
"CVE-2020-6428",
"CVE-2015-1241",
"CVE-2015-2737",
"CVE-2016-2800",
"CVE-2016-1602",
"CVE-2022-31252",
"CVE-2023-34256",
"CVE-2016-1682",
"CVE-2016-1695",
"CVE-2016-1653",
"CVE-2020-6429"
]
},
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 5
}
},
"FF": {
"DH": {
"Diffie-Hellman": 13
},
"DSA": {
"DSA": 16
}
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"CTR": {
"CTR": 3
},
"ECB": {
"ECB": 3
},
"GCM": {
"GCM": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"NSS": {
"NSS": 43
}
},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 2
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 4,
"P-384": 4,
"P-521": 4
}
},
"eval_facility": {
"atsec": {
"atsec": 34
}
},
"fips_cert_id": {
"Cert": {
"#11": 4,
"#1272": 1,
"#1273": 1,
"#1274": 1,
"#1309": 1,
"#1310": 1,
"#1311": 1,
"#1551": 2,
"#1552": 1,
"#1553": 2,
"#1554": 1,
"#1555": 2,
"#1556": 1,
"#1824": 1,
"#1825": 1,
"#1826": 1,
"#2580": 1,
"#2581": 1,
"#2582": 1,
"#2697": 1,
"#2698": 1,
"#2699": 1,
"#3325": 1,
"#3326": 1,
"#3327": 1,
"#4068": 1,
"#4069": 1,
"#4070": 1,
"#5003": 1,
"#5004": 1,
"#5005": 1
}
},
"fips_certlike": {
"Certlike": {
"#1555 Diffie-Hellman": 1,
"CVL #1551": 2,
"HMAC-SHA- 256": 2,
"HMAC-SHA-1": 2,
"HMAC-SHA-224": 2,
"HMAC-SHA-384": 2,
"HMAC-SHA-512": 2,
"PKCS #11": 6,
"PKCS#1": 7,
"RSA PKCS#1": 1,
"SHA-1": 3,
"SHA-224": 3,
"SHA-256": 6,
"SHA-384": 3,
"SHA-512": 3
}
},
"fips_security_level": {
"Level": {
"Level 1": 2
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 1
}
},
"SHA": {
"SHA1": {
"SHA-1": 3
},
"SHA2": {
"SHA-224": 3,
"SHA-256": 6,
"SHA-384": 3,
"SHA-512": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 19
},
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"SCA": {
"Timing Attacks": 2,
"Timing attack": 1,
"Timing attacks": 1,
"timing attacks": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 45,
"FIPS 180-4": 1,
"FIPS 186-4": 1,
"FIPS 197": 1,
"FIPS 198-1": 1,
"FIPS140-2": 1,
"FIPS186-4": 2
},
"NIST": {
"NIST SP 800-38A": 1,
"NIST SP 800-38D": 1,
"NIST SP 800-38F": 1,
"NIST SP 800-56A": 1,
"NIST SP 800-67": 1,
"NIST SP 800-90A": 1,
"SP 800-135": 1,
"SP 800-38F": 1,
"SP 800-90A": 10
},
"PKCS": {
"PKCS #11": 3,
"PKCS#1": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 10
},
"RC": {
"RC2": 1,
"RC5": 1
}
},
"DES": {
"3DES": {
"TDEA": 1,
"Triple-DES": 6
},
"DES": {
"DES": 4
}
},
"constructions": {
"MAC": {
"HMAC": 16,
"HMAC-SHA-224": 1,
"HMAC-SHA-384": 1,
"HMAC-SHA-512": 1
}
},
"miscellaneous": {
"Camellia": {
"Camellia": 1
},
"SEED": {
"SEED": 1
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "CMVP",
"/CreationDate": "D:20180417075600-05\u002700\u0027",
"/Creator": "Writer",
"/Producer": "LibreOffice 5.4",
"/Subject": "SUSE Linux Enterprise Server 12 - NSS Module",
"/Title": "FIPS 140-2 Non-Proprietary Security Policy",
"pdf_file_size_bytes": 333595,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://crypto.stanford.edu/~dabo/abstracts/ssl-timing.html",
"http://www.cryptography.com/timingattack/",
"http://csrc.nist.gov/publications/PubsFIPS.html",
"http://csrc.nist.gov/groups/STM/cmvp/standards.html",
"http://www.cryptsoft.com/pkcs11doc/STANDARD/pkcs-11v2-20.pdf",
"http://www.daemonology.net/papers/htt.pdf",
"http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-38F.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 32
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_garbage": false,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_pdf_hash": "f1756abe7d16b905f9b78b2ee14cddaae9254695b036f3d10ad187e35750ca19",
"policy_txt_hash": "ad8338830530a99cf06b9f40b09176144e6d83bf2a1350362f9e83ff0c06f159"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS Mode. The module generates cryptographic keys whose strengths are modified by available entropy",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/JulyConsolidatedCert.pdf",
"date_sunset": null,
"description": "SUSE Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Roles, Services, and Authentication: Level 2",
"Physical Security: N/A",
"Design Assurance: Level 2"
],
"fw_versions": null,
"historical_reason": "SP 800-56Arev3 transition",
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "SUSE Linux Enterprise Server 12 SP2 - NSS Cryptographic Module",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": "2.0",
"tested_conf": [
"SUSE Linux Enterprise Server 12 SP2 running on FUJITSU Server PRIMERGY CX2570 M2 inside a CX400 M1 enclosure with PAA",
"SUSE Linux Enterprise Server 12 SP2 running on FUJITSU Server PRIMERGY CX2570 M2 inside a CX400 M1 enclosure without PAA",
"SUSE Linux Enterprise Server 12 SP2 running on IBM z13 without PAI (single-user mode)"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2018-07-03",
"lab": "ATSEC INFORMATION SECURITY CORP",
"validation_type": "Initial"
}
],
"vendor": "SUSE, LLC",
"vendor_url": "http://www.suse.com"
}
}