[{"name":"S3-240003","title":"GSMA clarification: no unused software","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 1\/15\/2024. Original source : BSI (DE)","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":30,"status":"revised","reservation_date":"2024-02-01 09:08:50","uploaded":"2024-01-15 11:23:03","revisionof":"","revisedto":"S3-240080","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":134.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240003.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.2.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240004","title":"GSMA clarification: no unused functions","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 1\/15\/2024. Original source : BSI (DE)","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":40,"status":"revised","reservation_date":"2024-02-01 09:10:32","uploaded":"2024-01-15 11:23:28","revisionof":"","revisedto":"S3-240081","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":135.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240004.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.2.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240005","title":"GSMA clarification: no unsupported components","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 1\/15\/2024. Original source : BSI (DE)","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":50,"status":"revised","reservation_date":"2024-02-01 09:11:47","uploaded":"2024-01-15 11:23:28","revisionof":"","revisedto":"S3-240082","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":136.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240005.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.2.5","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240006","title":"GSMA clarification: Filesystem Authorization privileges","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"Source modified on 1\/15\/2024. Original source : BSI (DE)","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":60,"status":"revised","reservation_date":"2024-02-01 09:12:56","uploaded":"2024-01-15 11:23:28","revisionof":"","revisedto":"S3-240083","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":137.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240006.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.2.7","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240007","title":"Correct RRC connection reconfiguration to RRC reconfiguration","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":70,"status":"merged","reservation_date":"2024-05-01 11:20:53","uploaded":"2024-01-15 11:41:03","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.523,"crspecversion":"18.1.0","workitem":[{"winame":"SCAS_5G_split_gNB"}],"crnumber":4.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240007.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240008","title":"Test Case on Password Storage Support","source":"Nokia, Nokia Shanghai Bell, BSI","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":80,"status":"revised","reservation_date":"2024-08-01 09:51:18","uploaded":"2024-01-12 10:22:38","revisionof":"","revisedto":"S3-240098","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":138.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240008.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240009","title":"Test Case on No Default Content","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":90,"status":"revised","reservation_date":"2024-08-01 10:02:10","uploaded":"2024-01-12 10:22:38","revisionof":"","revisedto":"S3-240099","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":139.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240009.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240010","title":"Test Case on No Directory Listings","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":100,"status":"revised","reservation_date":"2024-08-01 10:07:20","uploaded":"2024-01-12 10:22:38","revisionof":"","revisedto":"S3-240100","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":140.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240010.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240011","title":"Test Case on No Web Server Header Info","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":110,"status":"revised","reservation_date":"2024-08-01 10:11:22","uploaded":"2024-01-12 10:22:38","revisionof":"","revisedto":"S3-240101","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":141.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240011.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240012","title":"Test Case on No Web Server Error Pages Info","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":120,"status":"revised","reservation_date":"2024-08-01 10:16:08","uploaded":"2024-01-12 10:22:38","revisionof":"","revisedto":"S3-240102","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":142.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240012.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240013","title":"Test Case on No Web Server File Type Mappings","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":130,"status":"revised","reservation_date":"2024-08-01 10:20:58","uploaded":"2024-01-12 10:22:39","revisionof":"","revisedto":"S3-240103","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":143.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240013.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240014","title":"Assessment tool definition","source":"Keysight Technologies UK Ltd","contact":"Antonio S\u00e1nchez","contact-id":98082,"tdoctype":"CR","for":"Approval","abstract":"Added description of assessment tool","secretary_remarks":"Source modified on 1\/15\/2024. Original source : Keysight Technologies UK Ltd","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":140,"status":"revised","reservation_date":"2024-09-01 09:52:09","uploaded":"2024-01-15 11:21:27","revisionof":"","revisedto":"S3-240109","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":144.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240014.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"3.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240015","title":"Discussion Paper on PCF SCAS contents","source":"BSI (DE)","contact":"Joerg Andreas","contact-id":97336,"tdoctype":"discussion","for":"Agreement","abstract":"During the PCF analysis, it became apparent that the PCF NF performs a maintenance\nfunction. This means that policies are stored and received by a similar network\nfunction type (NFType). For instance, the AM Policy Authorization and AM Policy\nControl func","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":150,"status":"noted","reservation_date":"2024-09-01 15:20:57","uploaded":"2024-01-15 06:38:55","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.528,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240015.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240016","title":"Improving the SCAS specification way of work","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"discussion","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":160,"status":"noted","reservation_date":"2024-10-01 08:59:42","uploaded":"2024-01-12 10:22:39","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240016.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240017","title":"Minimized kernel network functions (TC_ IP_MULTICAST_HANDLING)","source":"Deutsche Telekom AG","contact":"Thomas P\u00e4tzold","contact-id":80110,"tdoctype":"CR","for":"Approval","abstract":"Rewrite of test case so it is objective and meets the NESAS purpose.","secretary_remarks":"Source modified on 1\/15\/2024. Original source : Deutsche Telekom AG","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":170,"status":"revised","reservation_date":"2024-10-01 09:16:11","uploaded":"2024-01-15 10:15:35","revisionof":"","revisedto":"S3-240088","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"TEI18"}],"crnumber":145.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240017.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.3.1.2Minimized kernel network functions","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240018","title":"No automatic launch of removable media [TC_NO_AUTO_LAUNCH_OF_REMOVABLE_MEDIA]","source":"Deutsche Telekom AG","contact":"Thomas P\u00e4tzold","contact-id":80110,"tdoctype":"CR","for":"Approval","abstract":"The current wording is grammatically incorrect and could potentially confuse the reader about what is actually being automatically launched: the removable media or the Network Product. To avoid this ambiguity, it is proposed to change the requirente to \u201cN","secretary_remarks":"Title modified on 1\/15\/2024. Original title : TC_NO_AUTO_LAUNCH_OF_REMOVABLE_MEDIA<br\/><br\/>Source modified on 1\/15\/2024. Original source : Deutsche Telekom AG","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":180,"status":"revised","reservation_date":"2024-10-01 09:21:24","uploaded":"2024-01-15 10:15:35","revisionof":"","revisedto":"S3-240089","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"TEI18"}],"crnumber":146.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240018.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.3.1.2Minimized kernel network functions","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240019","title":"Syn Flood Prevention [TC_SYN_FLOOD_PREVENTION]","source":"Deutsche Telekom AG","contact":"Thomas P\u00e4tzold","contact-id":80110,"tdoctype":"CR","for":"Approval","abstract":"Rewrite of test case so it is objective and meets the NESAS purpose.","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":190,"status":"revised","reservation_date":"2024-10-01 09:24:10","uploaded":"2024-01-15 10:15:35","revisionof":"","revisedto":"S3-240090","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":147.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240019.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240020","title":"External file system mount restrictions (TC_EXTERNAL_FILE_SYSTEM _MOUNT_RESTRICTIONS)","source":"Deutsche Telekom AG","contact":"Thomas P\u00e4tzold","contact-id":80110,"tdoctype":"CR","for":"Approval","abstract":"Rewrite of test case so it is objective and meets the NESAS purpose.","secretary_remarks":"Source modified on 1\/15\/2024. Original source : Deutsche Telekom AG","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":200,"status":"revised","reservation_date":"2024-10-01 09:27:03","uploaded":"2024-01-15 10:15:35","revisionof":"","revisedto":"S3-240091","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":148.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240020.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"4.3.3.1.6External file system mount restrictions","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240026","title":"Clarification of bootable memory device test","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 1\/15\/2024. Original source : BSI (DE)","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":260,"status":"revised","reservation_date":"2024-12-01 09:27:01","uploaded":"2024-01-15 11:23:28","revisionof":"","revisedto":"S3-240084","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":149.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240026.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.3.3.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240027","title":"Clarification of UP Integrity Protection test cases for eNB","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 1\/15\/2024. Original source : BSI (DE)","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":270,"status":"agreed","reservation_date":"2024-12-01 10:35:38","uploaded":"2024-01-15 11:23:28","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.216,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_eNB"}],"crnumber":26.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-240369","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240027.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.2.1.16, 4.2.2.1.17, 4.2.2.1.18","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240028","title":"Clarification of UP IP selection and bidding down prevention of eNB","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 1\/15\/2024. Original source : BSI (DE)","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":280,"status":"agreed","reservation_date":"2024-12-01 10:38:13","uploaded":"2024-01-15 11:23:28","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.216,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_eNB"}],"crnumber":27.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-240369","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240028.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.2.1.19, 4.2.2.1.20","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240029","title":"Added parameters to NRF discovery authorization","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 1\/15\/2024. Original source : BSI (DE)","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":290,"status":"not pursued","reservation_date":"2024-12-01 10:40:57","uploaded":"2024-01-15 11:23:28","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.518,"crspecversion":"18.0.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":5.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240029.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.2.2.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240030","title":"Added parameters to NRF discovery authorization threat reference","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 1\/15\/2024. Original source : BSI (DE)","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":300,"status":"not pursued","reservation_date":"2024-12-01 10:42:41","uploaded":"2024-01-15 11:23:28","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.926,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":82.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240030.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"H.2.2.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240031","title":"Clarification and simplification of test cases regarding UP CP and IP activation at split-gNB","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 1\/15\/2024. Original source : BSI (DE)","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":310,"status":"revised","reservation_date":"2024-12-01 10:52:59","uploaded":"2024-01-15 11:23:28","revisionof":"","revisedto":"S3-240085","release":"Rel-18","crspec":33.523,"crspecversion":"18.1.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":5.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240031.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"5.2.2.1.4, 5.2.2.1.5","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240032","title":"Clarification of test cases on user data IP and CP in split-gNB","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 1\/15\/2024. Original source : BSI (DE)","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":320,"status":"agreed","reservation_date":"2024-12-01 11:49:36","uploaded":"2024-01-15 11:23:28","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.523,"crspecversion":"18.1.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":6.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-240364","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240032.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"6.2.2.1.6, 6.2.2.1.7","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240033","title":"Removal of note in GVNP lifecyle management","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 1\/15\/2024. Original source : BSI (DE)","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":330,"status":"not pursued","reservation_date":"2024-12-01 12:01:45","uploaded":"2024-01-15 11:23:29","revisionof":"","revisedto":"S3-240086, S3-240108","release":"Rel-18","crspec":33.527,"crspecversion":"18.1.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":2.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240033.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.7.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240034","title":"Fixed typo in VNF traffic separation test case","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 1\/15\/2024. Original source : BSI (DE)","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":340,"status":"revised","reservation_date":"2024-12-01 12:05:00","uploaded":"2024-01-15 11:23:29","revisionof":"","revisedto":"S3-240087","release":"Rel-18","crspec":33.527,"crspecversion":"18.1.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":3.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240034.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.6.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240035","title":"Clarifications to Basic Vulnerability test cases","source":"MITRE Corporation","contact":"David Gabay","contact-id":90111,"tdoctype":"CR","for":"Approval","abstract":"Provide clarifications on the testing tools, tool configuration, and procedures in BVT clauses 4.4.1, 4.4.2, 4.4.3, and 4.4.4","secretary_remarks":"Source modified on 1\/15\/2024. Original source : MITRE Corporation","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":350,"status":"agreed","reservation_date":"2024-01-15 03:19:02","uploaded":"2024-01-15 03:24:30","revisionof":"","revisedto":"S3-240110","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":150.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240035.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.4.1, 4.4.2, 4.4.3, 4.4.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240036","title":"Update to the clause 4.2.2.2.2 - Protection at the transport layer","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":360,"status":"revised","reservation_date":"2024-01-15 08:13:29","uploaded":"2024-01-15 08:44:27","revisionof":"","revisedto":"S3-240092, S3-240093","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":151.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240036.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240037","title":"Update to the clause 4.2.3.2.4 - Protecting data and information in transfer","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":370,"status":"revised","reservation_date":"2024-01-15 08:13:30","uploaded":"2024-01-15 08:44:27","revisionof":"","revisedto":"S3-240094","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":152.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240037.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240038","title":"Update to the clause 4.2.3.3.2 - Boot from intended memory devices only","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":380,"status":"revised","reservation_date":"2024-01-15 08:13:31","uploaded":"2024-01-15 08:44:28","revisionof":"","revisedto":"S3-240095","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":153.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240038.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240039","title":"Update to the clause 4.2.3.4.1.1 - System functions shall not be used without successful authentication and authorization","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":390,"status":"revised","reservation_date":"2024-01-15 08:13:32","uploaded":"2024-01-15 08:44:28","revisionof":"","revisedto":"S3-240096","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":154.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240039.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240040","title":"Update to the clause 4.2.3.4.3.1 - Password Structure","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":400,"status":"revised","reservation_date":"2024-01-15 08:13:32","uploaded":"2024-01-15 08:44:28","revisionof":"","revisedto":"S3-240097","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":155.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240040.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240041","title":"Updates threat references to TS 33.117 - clauses 4.2.2 to 4.2.3","source":"ZTE Corporation","contact":"Peilin Liu","contact-id":97327,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Title modified on 1\/15\/2024. Original title : Updates threat references to TS 33.117 - clause 4.2.2 to 4.2.3<br\/><br\/>Source modified on 1\/15\/2024. Original source : ZTE  Corporation","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":410,"status":"revised","reservation_date":"2024-01-15 08:20:46","uploaded":"2024-01-15 09:28:46","revisionof":"","revisedto":"S3-240111","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":156.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240041.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.2.2.4.1, 4.2.3.2, 4.2.3.3, 4.2.3.4, 4.2.3.5, 4.2.3.6","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240042","title":"Updates threat references to TS 33.117 - clauses 4.2.4 to 4.2.6","source":"ZTE Corporation","contact":"Peilin Liu","contact-id":97327,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Title modified on 1\/15\/2024. Original title : Updates threat references to TS 33.117 - clause 4.2.4 to 4.2.6<br\/><br\/>Source modified on 1\/15\/2024. Original source : ZTE  Corporation","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":420,"status":"revised","reservation_date":"2024-01-15 08:23:42","uploaded":"2024-01-15 09:28:46","revisionof":"","revisedto":"S3-240112","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":157.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240042.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.4.1, 4.2.4.2, 4.2.5.1, 4.2.5.2, 4.2.5.3, 4.2.5.4, 4.2.6.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240043","title":"Updates threat references to TS 33.117 - clauses 4.3.2","source":"ZTE Corporation","contact":"Peilin Liu","contact-id":97327,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Title modified on 1\/15\/2024. Original title : Updates threat references to TS 33.117 - clause 4.3.2<br\/><br\/>Source modified on 1\/15\/2024. Original source : ZTE  Corporation","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":430,"status":"agreed","reservation_date":"2024-01-15 08:25:22","uploaded":"2024-01-15 09:28:46","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":158.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-240365","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240043.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.2.1, 4.3.2.2, 4.3.2.3, 4.3.2.4, 4.3.2.5, 4.3.2.6, 4.3.2.7","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240044","title":"Updates threat references to TS 33.117 - clauses 4.3.3","source":"ZTE Corporation","contact":"Peilin Liu","contact-id":97327,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Title modified on 1\/15\/2024. Original title : Updates threat references to TS 33.117 - clause 4.3.3<br\/><br\/>Source modified on 1\/15\/2024. Original source : ZTE  Corporation","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":440,"status":"agreed","reservation_date":"2024-01-15 08:26:37","uploaded":"2024-01-15 09:28:46","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":159.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-240366","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240044.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.3.1, 4.3.3.2, 4.3.3.3, 4.3.3.4, 4.3.3.5, 4.3.3.6","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240045","title":"Updates threat references to TS 33.117 - clauses 4.3.4 to 4.3.5","source":"ZTE Corporation","contact":"Peilin Liu","contact-id":97327,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Title modified on 1\/15\/2024. Original title : Updates threat references to TS 33.117 - clause 4.3.4 to 4.3.5<br\/><br\/>Source modified on 1\/15\/2024. Original source : ZTE  Corporation","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":450,"status":"revised","reservation_date":"2024-01-15 08:27:43","uploaded":"2024-01-15 09:28:46","revisionof":"","revisedto":"S3-240113","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":160.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240045.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.4.2, 4.3.4.3, 4.3.4.4, 4.3.4.5, 4.3.4.6, 4.3.4.7, 4.3.4.8, 4.3.4.9, 4.3.4.10, 4.3.4.11, 4.3.4.12, 4.3.4.13, 4.3.4.14, 4.3.5.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240046","title":"Updates threat references to TS 33.117 - clause 4.4.2 to 4.4.4","source":"ZTE Corporation","contact":"Peilin Liu","contact-id":97327,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 1\/15\/2024. Original source : ZTE  Corporation","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":460,"status":"revised","reservation_date":"2024-01-15 08:28:56","uploaded":"2024-01-15 09:28:46","revisionof":"","revisedto":"S3-240114","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":161.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240046.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.4.2, 4.4.3, 4.4.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240047","title":"Changes to 4.2.4.1.2.1","source":"Huawei; HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 1\/15\/2024. Original title : TS33.117_Changes to 4.2.4.1.2.1<br\/><br\/>Source modified on 1\/15\/2024. Original source : Huawei, HiSilicon","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":470,"status":"revised","reservation_date":"2024-01-15 08:39:14","uploaded":"2024-01-15 09:39:21","revisionof":"","revisedto":"S3-240123","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":162.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240047.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.4.1.2.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240048","title":"TS33.117_Changes to 4.2.4.2.2","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":480,"status":"revised","reservation_date":"2024-01-15 08:39:14","uploaded":"2024-01-15 09:39:21","revisionof":"","revisedto":"S3-240124","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":163.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240048.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240049","title":"TS33.117_Changes to 4.2.5.3","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":490,"status":"revised","reservation_date":"2024-01-15 08:39:15","uploaded":"2024-01-15 09:39:21","revisionof":"","revisedto":"S3-240125","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":164.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240049.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240050","title":"TS33.117_Changes to 4.2.6.2.1","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":500,"status":"agreed","reservation_date":"2024-01-15 08:39:16","uploaded":"2024-01-15 09:39:21","revisionof":"","revisedto":"S3-240126","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":165.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240050.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240051","title":"Changes to 4.3.2.1","source":"Huawei; HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 1\/15\/2024. Original title : TS33.117_Changes to 4.3.2.1<br\/><br\/>Source modified on 1\/15\/2024. Original source : Huawei, HiSilicon","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":510,"status":"revised","reservation_date":"2024-01-15 08:39:16","uploaded":"2024-01-15 09:39:21","revisionof":"","revisedto":"S3-240127","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":166.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240051.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.2.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240052","title":"Changes to 4.2.2.1.8 in TS 33.511","source":"Huawei; HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 1\/15\/2024. Original source : Huawei, HiSilicon","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":520,"status":"revised","reservation_date":"2024-01-15 08:39:17","uploaded":"2024-01-15 09:39:21","revisionof":"","revisedto":"S3-240128","release":"Rel-18","crspec":33.511,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":55.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240052.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.2.1.8","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240053","title":"Changes to 4.2.2.1.12 in TS 33.511","source":"Huawei; HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 1\/15\/2024. Original source : Huawei, HiSilicon","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":530,"status":"revised","reservation_date":"2024-01-15 08:39:17","uploaded":"2024-01-15 09:39:21","revisionof":"","revisedto":"S3-240129","release":"Rel-18","crspec":33.511,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":56.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240053.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.2.1.12","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240054","title":"TS33.117_Changes to 4.2.2.2.2","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":540,"status":"revised","reservation_date":"2024-01-15 08:39:18","uploaded":"2024-01-15 09:39:21","revisionof":"","revisedto":"S3-240130","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":167.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240054.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240055","title":"Add certificate enrolment to TS 33.511","source":"Huawei; HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 1\/15\/2024. Original source : Huawei, HiSilicon","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":550,"status":"not pursued","reservation_date":"2024-01-15 08:39:19","uploaded":"2024-01-15 09:39:21","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.511,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":57.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240055.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.2.1.x(new)","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240056","title":"Peer certificate checking at gNB to TS 33.511","source":"Huawei; HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 1\/15\/2024. Original source : Huawei, HiSilicon","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":560,"status":"not pursued","reservation_date":"2024-01-15 08:39:19","uploaded":"2024-01-15 09:39:21","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.511,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":58.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240056.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.2.1.x(new)","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240057","title":"Add threat to certificate enrolment","source":"Huawei; HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 1\/15\/2024. Original title : Add threat to certificate enrolment to TR 33.926<br\/><br\/>Source modified on 1\/15\/2024. Original source : Huawei, HiSilicon","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":570,"status":"not pursued","reservation_date":"2024-01-15 08:39:20","uploaded":"2024-01-15 09:39:21","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.926,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":83.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240057.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"D.2.2.x(new)","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240058","title":"Add threat to peer certificate checking at gNB","source":"Huawei; HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 1\/15\/2024. Original source : Huawei, HiSilicon","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":580,"status":"not pursued","reservation_date":"2024-01-15 08:39:21","uploaded":"2024-01-15 09:39:21","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.926,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":84.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240058.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"D.2.2.x(new)","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240059","title":"Test case update to TS 33.511","source":"Huawei; HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 1\/15\/2024. Original title : test case update to TS 33.511<br\/><br\/>Source modified on 1\/15\/2024. Original source : Huawei, HiSilicon","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":590,"status":"revised","reservation_date":"2024-01-15 08:39:22","uploaded":"2024-01-15 09:39:21","revisionof":"","revisedto":"S3-240131","release":"Rel-18","crspec":33.511,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":59.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240059.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.2.1.13, 4.2.2.1.18","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240060","title":"Change RRC SQN to PDCP COUNT","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":600,"status":"revised","reservation_date":"2024-01-15 08:39:23","uploaded":"2024-01-15 09:39:21","revisionof":"","revisedto":"S3-240132","release":"Rel-16","crspec":33.511,"crspecversion":"16.11.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":60.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240060.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240061","title":"[mirror] correction to TS 33.511","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":610,"status":"withdrawn","reservation_date":"2024-01-15 08:39:24","uploaded":"2024-01-15 09:39:21","revisionof":"","revisedto":"","release":"Rel-17","crspec":33.511,"crspecversion":"17.5.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":61.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240061.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240062","title":"[mirror] correction to TS 33.511","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":620,"status":"withdrawn","reservation_date":"2024-01-15 08:39:25","uploaded":"2024-01-15 09:39:21","revisionof":"","revisedto":"","release":"Rel-18","crspec":33.511,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":62.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240062.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240063","title":"Clarification for 4.3.4.2 - 33.117","source":"Keysight Technologies UK Ltd","contact":"Antonio S\u00e1nchez","contact-id":98082,"tdoctype":"CR","for":"Approval","abstract":"Added clarifications in the test case","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":630,"status":"revised","reservation_date":"2024-01-15 09:05:16","uploaded":"2024-01-15 11:23:09","revisionof":"","revisedto":"S3-240115","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph2"}],"crnumber":168.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240063.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240064","title":"Change RRC SQN to PDCP COUNT","source":"Huawei; HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 1\/15\/2024. Original title : [mirror] correction to TS 33.511<br\/><br\/>Source modified on 1\/15\/2024. Original source : Huawei, HiSilicon","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":640,"status":"revised","reservation_date":"2024-01-15 09:46:48","uploaded":"2024-01-15 09:50:10","revisionof":"","revisedto":"S3-240133","release":"Rel-18","crspec":33.511,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":63.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240064.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.2.1.9","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240065","title":"Change RRC SQN to PDCP COUNT","source":"Huawei; HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 1\/15\/2024. Original title : [mirror] correction to TS 33.511<br\/><br\/>Source modified on 1\/15\/2024. Original source : Huawei, HiSilicon","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":650,"status":"revised","reservation_date":"2024-01-15 09:49:03","uploaded":"2024-01-15 09:50:10","revisionof":"","revisedto":"S3-240134","release":"Rel-17","crspec":33.511,"crspecversion":"17.5.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":64.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240065.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.2.1.9","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240066","title":"Clarification for 4.3.4.3 - 33.117","source":"Keysight Technologies UK Ltd","contact":"Antonio S\u00e1nchez","contact-id":98082,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":660,"status":"revised","reservation_date":"2024-01-15 10:09:48","uploaded":"2024-01-15 11:23:09","revisionof":"","revisedto":"S3-240116","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":169.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240066.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240067","title":"Log transfer to centralized storage","source":"Ericsson","contact":"Markus Hanhisalo","contact-id":80065,"tdoctype":"CR","for":"Agreement","abstract":"Removes subjectivity (\u201cstandard protocols\u201d, \u201csecure protocol\u201d and \u201csecure standard protocol\u201d).","secretary_remarks":"Source modified on 1\/15\/2024. Original source : Ericsson","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":670,"status":"revised","reservation_date":"2024-01-15 10:22:42","uploaded":"2024-01-15 10:33:16","revisionof":"","revisedto":"S3-240104","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":170.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240067.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.3.6.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240068","title":"Growing content shall not influence system functions","source":"Ericsson","contact":"Markus Hanhisalo","contact-id":80065,"tdoctype":"CR","for":"Agreement","abstract":"Correction to text.","secretary_remarks":"Source modified on 1\/15\/2024. Original source : Ericsson","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":680,"status":"revised","reservation_date":"2024-01-15 10:40:10","uploaded":"2024-01-15 10:47:21","revisionof":"","revisedto":"S3-240105","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":171.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240068.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.4.1.1.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240069","title":"Processing of ICMPv4 and ICMPv6 packets","source":"Ericsson","contact":"Markus Hanhisalo","contact-id":80065,"tdoctype":"CR","for":"Agreement","abstract":"Correction to test case 4.2.4.1.1.2 to remove subjectivity.","secretary_remarks":"Source modified on 1\/15\/2024. Original source : Ericsson","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":690,"status":"revised","reservation_date":"2024-01-15 10:52:46","uploaded":"2024-01-15 11:07:57","revisionof":"","revisedto":"S3-240106","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":172.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240069.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.4.1.1.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240070","title":"Handling of IP options and extensions","source":"Ericsson","contact":"Markus Hanhisalo","contact-id":80065,"tdoctype":"CR","for":"","abstract":"It is suggested to reference RFC 7126, instead of using \u201cunnecessary options\u201d.","secretary_remarks":"Source modified on 1\/15\/2024. Original source : Ericsson","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":700,"status":"revised","reservation_date":"2024-01-15 11:17:58","uploaded":"2024-01-15 11:25:40","revisionof":"","revisedto":"S3-240107","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":173.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240070.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.4.1.1.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240071","title":"Editorial Updates to Section 4.3.5.1 of TS 33.117 for clarification","source":"IIT Bombay","contact":"Manjesh Kumar Hanawal","contact-id":102957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 1\/15\/2024. Original source : IIT Bombay","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":710,"status":"revised","reservation_date":"2024-01-15 11:39:31","uploaded":"2024-01-15 12:22:13","revisionof":"","revisedto":"S3-240117","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":174.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240071.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.5.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240072","title":"Editorial Updates to Section 4.3.6.2 of TS 33.117 for clarification","source":"IIT Bombay","contact":"Manjesh Kumar Hanawal","contact-id":102957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 1\/15\/2024. Original source : IIT Bombay","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":720,"status":"revised","reservation_date":"2024-01-15 11:51:32","uploaded":"2024-01-15 12:22:13","revisionof":"","revisedto":"S3-240118","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":175.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240072.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.6.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240073","title":"Editorial Updates to Section 4.3.6.3 of TS 33.117 for clarification","source":"IIT Bombay","contact":"Manjesh Kumar Hanawal","contact-id":102957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 1\/15\/2024. Original source : IIT Bombay","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":730,"status":"revised","reservation_date":"2024-01-15 11:53:17","uploaded":"2024-01-15 12:22:13","revisionof":"","revisedto":"S3-240119","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":176.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240073.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.6.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240074","title":"Editorial Updates to Section 4.3.6.4 of TS 33.117 for clarification","source":"IIT Bombay","contact":"Manjesh Kumar Hanawal","contact-id":102957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 1\/15\/2024. Original source : IIT Bombay","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":740,"status":"revised","reservation_date":"2024-01-15 11:55:25","uploaded":"2024-01-15 12:22:13","revisionof":"","revisedto":"S3-240120","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":177.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240074.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.6.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240080","title":"GSMA clarification: no unused software","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 1\/25\/2024. Original source : BSI (DE)","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":800,"status":"agreed","reservation_date":"2024-01-25 15:42:59","uploaded":"2024-01-25 16:02:25","revisionof":"S3-240003","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":134.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240365","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240080.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.2.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240081","title":"GSMA clarification: no unused functions","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 1\/25\/2024. Original source : BSI (DE)","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":810,"status":"agreed","reservation_date":"2024-01-25 15:43:38","uploaded":"2024-01-25 16:02:25","revisionof":"S3-240004","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":135.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240365","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240081.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.2.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240082","title":"GSMA clarification: no unsupported components","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 1\/25\/2024. Original source : BSI (DE)","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":820,"status":"agreed","reservation_date":"2024-01-25 15:44:08","uploaded":"2024-01-25 16:02:25","revisionof":"S3-240005","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":136.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240365","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240082.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.2.5","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240083","title":"GSMA clarification: Filesystem Authorization privileges","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 1\/25\/2024. Original source : BSI (DE)","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":830,"status":"agreed","reservation_date":"2024-01-25 15:44:35","uploaded":"2024-01-25 16:02:25","revisionof":"S3-240006","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":137.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240365","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240083.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.2.7","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240084","title":"Clarification of bootable memory device test","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 1\/25\/2024. Original source : BSI (DE)","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":840,"status":"agreed","reservation_date":"2024-01-25 15:45:05","uploaded":"2024-01-25 16:02:25","revisionof":"S3-240026","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":149.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"SP-240365","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240084.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.3.3.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240085","title":"Clarification and simplification of test cases regarding UP CP and IP activation at split-gNB","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 1\/25\/2024. Original source : BSI (DE)","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":850,"status":"agreed","reservation_date":"2024-01-25 15:45:37","uploaded":"2024-01-25 16:02:26","revisionof":"S3-240031","revisedto":"","release":"Rel-18","crspec":33.523,"crspecversion":"18.1.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":5.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240364","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240085.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"5.2.2.1.4, 5.2.2.1.5","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240086","title":"Removal of note in GVNP lifecyle management","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 1\/25\/2024. Original source : BSI (DE)","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":860,"status":"withdrawn","reservation_date":"2024-01-25 15:46:08","uploaded":"2024-01-25 16:02:26","revisionof":"S3-240033","revisedto":"","release":"Rel-18","crspec":33.527,"crspecversion":"18.1.0","workitem":[{"winame":"VNP_SECAM_SCAS"},{"winame":" SCAS_5G_Ph3"}],"crnumber":2.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240086.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.7.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240087","title":"Fixed typo in VNF traffic separation test case","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 1\/25\/2024. Original source : BSI (DE)","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":870,"status":"agreed","reservation_date":"2024-01-25 15:46:44","uploaded":"2024-01-25 16:02:26","revisionof":"S3-240034","revisedto":"","release":"Rel-18","crspec":33.527,"crspecversion":"18.1.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":3.0,"crrevision":1.0,"crcategory":"D","tsg_crp":"SP-240364","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240087.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.6.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240088","title":"Minimized kernel network functions (TC_ IP_MULTICAST_HANDLING)","source":"Deutsche Telekom AG","contact":"Johannes Achter","contact-id":94365,"tdoctype":"CR","for":"Approval","abstract":"Rewrite of test case so it is objective and meets the NESAS purpose.","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":880,"status":"not pursued","reservation_date":"2024-01-26 06:39:32","uploaded":"2024-01-30 09:21:08","revisionof":"S3-240017","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":145.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240088.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240089","title":"No automatic launch of removable media [TC_NO_AUTO_LAUNCH_OF_REMOVABLE_MEDIA]","source":"Deutsche Telekom AG","contact":"Johannes Achter","contact-id":94365,"tdoctype":"CR","for":"Approval","abstract":"The current wording is grammatically incorrect and could potentially confuse the reader about what is actually being automatically launched: the removable media or the Network Product. To avoid this ambiguity, it is proposed to change the requirente to \u201cN","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":890,"status":"agreed","reservation_date":"2024-01-26 06:40:56","uploaded":"2024-01-30 09:21:08","revisionof":"S3-240018","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":146.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240365","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240089.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.3.1.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240090","title":"Syn Flood Prevention [TC_SYN_FLOOD_PREVENTION]","source":"Deutsche Telekom AG","contact":"Johannes Achter","contact-id":94365,"tdoctype":"CR","for":"Approval","abstract":"Rewrite of test case so it is objective and meets the NESAS purpose.","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":900,"status":"agreed","reservation_date":"2024-01-26 06:42:01","uploaded":"2024-01-30 09:21:08","revisionof":"S3-240019","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":147.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240365","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240090.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240091","title":"External file system mount restrictions (TC_EXTERNAL_FILE_SYSTEM _MOUNT_RESTRICTIONS)","source":"Deutsche Telekom AG","contact":"Johannes Achter","contact-id":94365,"tdoctype":"CR","for":"Approval","abstract":"Rewrite of test case so it is objective and meets the NESAS purpose.","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":910,"status":"not pursued","reservation_date":"2024-01-26 06:43:06","uploaded":"2024-01-30 09:21:08","revisionof":"S3-240020","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":148.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240091.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":true,"clauses_affected":"4.3.3.1.6External file system mount restrictions","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240092","title":"Update to the clause 4.2.2.2.2 - Protection at the transport layer","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":920,"status":"agreed","reservation_date":"2024-01-26 07:39:42","uploaded":"2024-01-30 09:21:08","revisionof":"S3-240036","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":151.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240365","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240092.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.2.2.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240093","title":"Update to the clause 4.2.2.2.2 - Protection at the transport layer","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":930,"status":"withdrawn","reservation_date":"2024-01-26 07:42:03","uploaded":null,"revisionof":"S3-240036","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":151.0,"crrevision":2.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240094","title":"Update to the clause 4.2.3.2.4 - Protecting data and information in transfer","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":940,"status":"agreed","reservation_date":"2024-01-26 07:44:32","uploaded":"2024-01-30 09:21:08","revisionof":"S3-240037","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":152.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240365","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240094.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.3.2.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240095","title":"Update to the clause 4.2.3.3.2 - Boot from intended memory devices only","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":950,"status":"agreed","reservation_date":"2024-01-26 07:45:56","uploaded":"2024-01-30 09:21:08","revisionof":"S3-240038","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":153.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240365","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240095.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.3.3.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240096","title":"Update to the clause 4.2.3.4.1.1 - System functions shall not be used without successful authentication and authorization","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":960,"status":"agreed","reservation_date":"2024-01-26 07:49:26","uploaded":"2024-01-30 09:21:08","revisionof":"S3-240039","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":154.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240365","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240096.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.3.4.1.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240097","title":"Update to the clause 4.2.3.4.3.1 - Password Structure","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":970,"status":"agreed","reservation_date":"2024-01-26 07:51:26","uploaded":"2024-01-30 09:21:08","revisionof":"S3-240040","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":155.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240365","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240097.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.3.4.3.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240098","title":"Test Case on Password Storage Support (TC_PSW_STOR_SUPPORT)","source":"Nokia, Nokia Shanghai Bell, BSI","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Title modified on 1\/26\/2024. Original title : Test Case on Password Storage Support <br\/><br\/>Source modified on 1\/26\/2024. Original source : Nokia, Nokia Shanghai Bell, BSI","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":980,"status":"agreed","reservation_date":"2024-01-26 09:21:47","uploaded":"2024-01-26 14:10:19","revisionof":"S3-240008","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":138.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240365","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240098.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.3.2.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240099","title":"GSMA review - Test Case on No Default Content (TC_NO_DEFAULT_CONTENT)","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 1\/26\/2024. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":990,"status":"agreed","reservation_date":"2024-01-26 09:23:17","uploaded":"2024-01-26 14:10:19","revisionof":"S3-240009","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":139.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240365","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240099.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.4.9","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240100","title":"GSMA Review - Test Case on No Directory Listings (TC_NO_DIRECTORY_LISTINGS)","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 1\/26\/2024. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1000,"status":"agreed","reservation_date":"2024-01-26 09:24:40","uploaded":"2024-01-26 14:10:19","revisionof":"S3-240010","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":140.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240365","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240100.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.4.10","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240101","title":"GSMA review - Test Case on No Web Server Header Info (TC_NO_WEB_SERVER_ HEADER_INFORMATION)","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"Source modified on 1\/26\/2024. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1010,"status":"agreed","reservation_date":"2024-01-26 09:25:38","uploaded":"2024-01-26 14:10:19","revisionof":"S3-240011","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":141.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240365","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240101.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.4.11","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240102","title":"GSMA review - Test Case on No Web Server Error Pages Info (TC_NO_WEB_SERVER_ERROR_ PAGES_INFORMATION)","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"Title modified on 1\/26\/2024. Original title : GSMA review - Test Case on No Web Server Error Pages Info <br\/><br\/>Source modified on 1\/26\/2024. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1020,"status":"agreed","reservation_date":"2024-01-26 09:26:47","uploaded":"2024-01-26 14:10:19","revisionof":"S3-240012","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":142.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240365","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240102.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.4.12","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240103","title":"GSMA review - Test Case on No Web Server File Type Mappings (TC_NO_WEB_SERVER_FILE_TYPE MAPPINGS)","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"Title modified on 1\/26\/2024. Original title : GSMA review - Test Case on No Web Server File Type Mappings <br\/><br\/>Source modified on 1\/26\/2024. Original source : Nokia, Nokia Shanghai Bell","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1030,"status":"agreed","reservation_date":"2024-01-26 09:28:04","uploaded":"2024-01-26 14:10:19","revisionof":"S3-240013","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":143.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240365","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240103.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.4.13","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240104","title":"Log transfer to centralized storage","source":"Ericsson","contact":"Markus Hanhisalo","contact-id":80065,"tdoctype":"CR","for":"Agreement","abstract":"Removes subjectivity (\u201cstandard protocols\u201d, \u201csecure protocol\u201d and \u201csecure standard protocol\u201d).","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1040,"status":"agreed","reservation_date":"2024-01-26 11:00:55","uploaded":"2024-01-29 09:38:11","revisionof":"S3-240067","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":170.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240366","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240104.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.3.6.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240105","title":"Growing content shall not influence system functions","source":"Ericsson","contact":"Markus Hanhisalo","contact-id":80065,"tdoctype":"CR","for":"Agreement","abstract":"Correction to text.","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1050,"status":"agreed","reservation_date":"2024-01-26 11:04:16","uploaded":"2024-01-29 09:38:11","revisionof":"S3-240068","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":171.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240366","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240105.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.4.1.1.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240106","title":"Processing of ICMPv4 and ICMPv6 packets","source":"Ericsson","contact":"Markus Hanhisalo","contact-id":80065,"tdoctype":"CR","for":"Agreement","abstract":"Correction to test case 4.2.4.1.1.2 to remove subjectivity.","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1060,"status":"agreed","reservation_date":"2024-01-26 11:06:27","uploaded":"2024-01-29 09:38:11","revisionof":"S3-240069","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":172.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240366","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240106.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.4.1.1.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240107","title":"Handling of IP options and extensions","source":"Ericsson","contact":"Markus Hanhisalo","contact-id":80065,"tdoctype":"CR","for":"Agreement","abstract":"It is proposed to reference RFC 7126","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1070,"status":"agreed","reservation_date":"2024-01-26 11:08:53","uploaded":"2024-01-29 09:38:11","revisionof":"S3-240070","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":173.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240366","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240107.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"2, 4.2.4.1.1.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240108","title":"Removal of note in GVNP lifecyle management","source":"BSI (DE)","contact":"Ben Lorenz","contact-id":98835,"tdoctype":"draftCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1080,"status":"withdrawn","reservation_date":"2024-01-26 11:35:22","uploaded":"2024-01-26 12:07:37","revisionof":"S3-240033","revisedto":"","release":"Rel-18","crspec":33.527,"crspecversion":"18.1.0","workitem":[{"winame":"VNP_SECAM_SCAS"},{"winame":" SCAS_5G_Ph3"}],"crnumber":"","crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240108.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240109","title":"Assessment tool definition","source":"Keysight Technologies UK Ltd","contact":"Antonio S\u00e1nchez","contact-id":98082,"tdoctype":"CR","for":"Approval","abstract":"Added description of assessment tool","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1090,"status":"agreed","reservation_date":"2024-01-26 14:33:09","uploaded":"2024-02-02 13:41:05","revisionof":"S3-240014","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":144.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240365","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240109.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240110","title":"Clarifications to Basic Vulnerability test cases","source":"MITRE Corporation","contact":"David Gabay","contact-id":90111,"tdoctype":"CR","for":"Approval","abstract":"Provide clarifications on the testing tools, tool configuration, and procedures in BVT clauses 4.4.1, 4.4.2, 4.4.3, and 4.4.4","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1100,"status":"agreed","reservation_date":"2024-01-26 14:36:45","uploaded":"2024-01-30 19:55:52","revisionof":"S3-240035","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":150.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240365","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240110.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.4.1, 4.4.2, 4.4.3, 4.4.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240111","title":"Updates threat references to TS 33.117 - clauses 4.2.2 to 4.2.3","source":"ZTE Corporation","contact":"Peilin Liu","contact-id":97327,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1110,"status":"agreed","reservation_date":"2024-01-26 14:37:55","uploaded":"2024-01-30 09:21:08","revisionof":"S3-240041","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":156.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240365","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240111.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.2.2.4.1, 4.2.3.2, 4.2.3.3, 4.2.3.4, 4.2.3.5, 4.2.3.6","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240112","title":"Updates threat references to TS 33.117 - clauses 4.2.4 to 4.2.6","source":"ZTE Corporation","contact":"Peilin Liu","contact-id":97327,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1120,"status":"agreed","reservation_date":"2024-01-26 14:38:39","uploaded":"2024-01-30 09:21:08","revisionof":"S3-240042","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":157.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240365","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240112.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.4.1, 4.2.4.2, 4.2.5.1, 4.2.5.2, 4.2.5.3, 4.2.5.4, 4.2.6.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240113","title":"Updates threat references to TS 33.117 - clauses 4.3.4 to 4.3.5","source":"ZTE Corporation","contact":"Peilin Liu","contact-id":97327,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1130,"status":"agreed","reservation_date":"2024-01-26 14:39:22","uploaded":"2024-01-30 09:21:08","revisionof":"S3-240045","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":160.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240366","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240113.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.4.2, 4.3.4.3, 4.3.4.4, 4.3.4.5, 4.3.4.6, 4.3.4.7, 4.3.4.8, 4.3.4.9, 4.3.4.10, 4.3.4.11, 4.3.4.12, 4.3.4.13, 4.3.4.14, 4.3.5.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240114","title":"Updates threat references to TS 33.117 - clause 4.4.2 to 4.4.4","source":"ZTE Corporation","contact":"Peilin Liu","contact-id":97327,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1140,"status":"agreed","reservation_date":"2024-01-26 14:40:02","uploaded":"2024-01-30 09:21:09","revisionof":"S3-240046","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":161.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240366","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240114.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.4.2, 4.4.3, 4.4.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240115","title":"Clarification for 4.3.4.2 - 33.117","source":"Keysight Technologies UK Ltd","contact":"Antonio S\u00e1nchez","contact-id":98082,"tdoctype":"CR","for":"Approval","abstract":"Added clarifications in the test case","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1150,"status":"agreed","reservation_date":"2024-01-26 14:42:03","uploaded":"2024-01-30 09:21:09","revisionof":"S3-240063","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":168.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240366","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240115.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.4.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240116","title":"Clarification for 4.3.4.3 - 33.117","source":"Keysight Technologies UK Ltd","contact":"Antonio S\u00e1nchez","contact-id":98082,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1160,"status":"agreed","reservation_date":"2024-01-26 14:48:51","uploaded":"2024-01-30 09:21:09","revisionof":"S3-240066","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":169.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240366","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240116.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240117","title":"Updates to Section 4.3.5.1 of TS 33.117 for clarification","source":"IIT Bombay","contact":"Manjesh Kumar Hanawal","contact-id":102957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1170,"status":"agreed","reservation_date":"2024-01-26 14:57:10","uploaded":"2024-01-30 09:21:09","revisionof":"S3-240071","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":174.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240366","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240117.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.5.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240118","title":"Updates to Section 4.3.6.2 of TS 33.117 for clarification","source":"IIT Bombay","contact":"Manjesh Kumar Hanawal","contact-id":102957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1180,"status":"agreed","reservation_date":"2024-01-26 14:58:40","uploaded":"2024-01-30 09:21:09","revisionof":"S3-240072","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":175.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240366","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240118.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.6.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240119","title":"Updates to Section 4.3.6.3 of TS 33.117 for clarification","source":"IIT Bombay","contact":"Manjesh Kumar Hanawal","contact-id":102957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1190,"status":"agreed","reservation_date":"2024-01-26 14:59:50","uploaded":"2024-01-30 09:21:09","revisionof":"S3-240073","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":176.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240366","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240119.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.6.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240120","title":"Updates to Section 4.3.6.4 of TS 33.117 for clarification","source":"IIT Bombay","contact":"Manjesh Kumar Hanawal","contact-id":102957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":30,"status":"agreed","reservation_date":"2024-01-26 15:00:51","uploaded":"2024-01-30 09:21:09","revisionof":"S3-240074","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":177.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240366","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240120.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.6.4","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240123","title":"Addressing subjective comments from GSMA and comments in BSI AIS-N2to 4.2.4.1.2.1","source":"Huawei; HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 1\/29\/2024. Original title : Addressing subjective comments from GSMA and comments in BSI AIS-N2 to 4.2.4.1.2.1<br\/><br\/>Source modified on 1\/29\/2024. Original source : Huawei, HiSilicon","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1230,"status":"agreed","reservation_date":"2024-01-29 01:12:37","uploaded":"2024-01-29 09:58:22","revisionof":"S3-240047","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":162.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240366","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240123.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.4.1.2.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240124","title":"Adding expected format of evidence  to clause 4.2.4.2.2","source":"Huawei; HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 1\/29\/2024. Original title : Adding expected format of evidence Changes to clause 4.2.4.2.2<br\/><br\/>Source modified on 1\/29\/2024. Original source : Huawei, HiSilicon","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1240,"status":"agreed","reservation_date":"2024-01-29 01:12:40","uploaded":"2024-01-29 09:58:22","revisionof":"S3-240048","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":163.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240366","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240124.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.4.2.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240125","title":"Address GSMA comments and add pre-condition excution steps and evidence to 4.2.5.3","source":"Huawei; HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 1\/29\/2024. Original source : Huawei, HiSilicon","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1250,"status":"agreed","reservation_date":"2024-01-29 01:12:40","uploaded":"2024-01-29 09:58:22","revisionof":"S3-240049","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":164.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240366","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240125.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.5.3","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240126","title":"Add evidence to clause 4.2.6.2.1","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1260,"status":"agreed","reservation_date":"2024-01-29 01:12:41","uploaded":"2024-01-29 09:58:22","revisionof":"S3-240050","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":165.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240366","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240126.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240127","title":"Addressing subjective comments from GSMA and comments in BSI AIS-N2 to 4.3.2.1","source":"Huawei; HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 1\/29\/2024. Original source : Huawei, HiSilicon","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1270,"status":"agreed","reservation_date":"2024-01-29 01:12:42","uploaded":"2024-01-29 09:58:22","revisionof":"S3-240051","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":166.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240366","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240127.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.3.2.1","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240128","title":"Correct the Requirement from RRC signalling to User data","source":"Huawei; HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 1\/29\/2024. Original title : Changes to 4.2.2.1.8 in TS 33.511<br\/><br\/>Source modified on 1\/29\/2024. Original source : Huawei, HiSilicon","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1280,"status":"agreed","reservation_date":"2024-01-29 01:12:42","uploaded":"2024-01-29 09:58:22","revisionof":"S3-240052","revisedto":"","release":"Rel-18","crspec":33.511,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":55.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240364","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240128.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.2.1.8","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240129","title":"Change serving network name to gNB","source":"Huawei; HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 1\/29\/2024. Original title : Changes to 4.2.2.1.12 in TS 33.511<br\/><br\/>Source modified on 1\/29\/2024. Original source : Huawei, HiSilicon","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1290,"status":"agreed","reservation_date":"2024-01-29 01:12:43","uploaded":"2024-01-29 09:58:22","revisionof":"S3-240053","revisedto":"","release":"Rel-18","crspec":33.511,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":56.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240364","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240129.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.2.1.12","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240130","title":"Remove the additional can in the evidence","source":"Huawei; HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 1\/29\/2024. Original title : TS33.117_Changes to 4.2.2.2.2<br\/><br\/>Source modified on 1\/29\/2024. Original source : Huawei, HiSilicon","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1300,"status":"agreed","reservation_date":"2024-01-29 01:12:44","uploaded":"2024-01-29 09:58:22","revisionof":"S3-240054","revisedto":"","release":"Rel-18","crspec":33.117,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":167.0,"crrevision":1.0,"crcategory":"D","tsg_crp":"SP-240366","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240130.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.2.2.2","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240131","title":"Test case update to TS 33.511","source":"Huawei; HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Title modified on 1\/29\/2024. Original title : test case update to TS 33.511<br\/><br\/>Source modified on 1\/29\/2024. Original source : Huawei, HiSilicon","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1310,"status":"agreed","reservation_date":"2024-01-29 01:12:44","uploaded":"2024-01-29 09:58:22","revisionof":"S3-240059","revisedto":"","release":"Rel-18","crspec":33.511,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":59.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240364","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240131.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.2.1.13, 4.2.2.1.18","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240132","title":"Change RRC SQN to PDCP COUNT","source":"Huawei; HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 1\/29\/2024. Original source : Huawei, HiSilicon","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1320,"status":"agreed","reservation_date":"2024-01-29 01:12:45","uploaded":"2024-01-29 09:58:22","revisionof":"S3-240060","revisedto":"","release":"Rel-16","crspec":33.511,"crspecversion":"16.11.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":60.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-240360","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240132.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.2.1.9","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240133","title":"Change RRC SQN to PDCP COUNT","source":"Huawei; HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 1\/29\/2024. Original source : Huawei, HiSilicon","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1330,"status":"agreed","reservation_date":"2024-01-29 01:12:46","uploaded":"2024-01-29 09:58:22","revisionof":"S3-240064","revisedto":"","release":"Rel-17","crspec":33.511,"crspecversion":"17.5.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":63.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"SP-240360","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240133.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.2.1.9","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-240134","title":"Change RRC SQN to PDCP COUNT","source":"Huawei; HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"Source modified on 1\/29\/2024. Original source : Huawei, HiSilicon","agenda_item_sort_order":3,"ainumber":"4.1.1","ainame":"Security Assurance","tdoc_agenda_sort_order":1340,"status":"agreed","reservation_date":"2024-01-29 01:12:47","uploaded":"2024-01-29 09:58:22","revisionof":"S3-240065","revisedto":"","release":"Rel-18","crspec":33.511,"crspecversion":"18.2.0","workitem":[{"winame":"SCAS_5G"}],"crnumber":64.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"SP-240360","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_114e\/Docs\/S3-240134.zip","group":"S3","meeting":"S3-114-Ad Hoc-e","year":2024,"uicc_affected":false,"me_affected":false,"ran_affected":false,"cn_affected":false,"clauses_affected":"4.2.2.1.9","crsinpack":null,"crsinpacknumber":0}]