[{"name":"SP-231339","title":"Rel-18 CRs on Security Assurance Specification for 5G Phase 3","source":"SA WG3","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR pack","for":"Approval","abstract":"33.117 CR0128; 33.117 CR0130; 33.117 CR0131; 33.513 CR0014R1; 33.515 CR0011R1; 33.514 CR0010R1; 33.926 CR0080R1; 33.514 CR0011R2; 33.117 CR0133; 33.117 CR0132R1; 33.117 CR0129R1","secretary_remarks":"Block approved","agenda_item_sort_order":105,"ainumber":"18.3","ainame":"SA WG3 and SA WG3-LI Rel-18 CRs","tdoc_agenda_sort_order":14960,"status":"approved","reservation_date":"2023-11-27 13:03:47","uploaded":"2023-12-04 13:26:27","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":[{"winame":"SCAS_5G_Ph3"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/TSG_SA\/TSGS_102_Edinburgh_2023-12\/Docs\/SP-231339.zip","group":"SP","meeting":"SP-102","year":2023,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":[{"crtdoc":"S3-234411","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.117,"crnumber":128,"crrevision":"","crcategory":"F","crrelease":"Rel-18","crspecversion":"18.1.0","crtitle":"Clarification on SCAS Modal Text"},{"crtdoc":"S3-234422","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.117,"crnumber":130,"crrevision":"","crcategory":"F","crrelease":"Rel-18","crspecversion":"18.1.0","crtitle":"Evidence correction for 33.117"},{"crtdoc":"S3-234435","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.117,"crnumber":131,"crrevision":"","crcategory":"F","crrelease":"Rel-18","crspecversion":"18.1.0","crtitle":"Basic Editorial Updates to TS 33.117"},{"crtdoc":"S3-234950","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.513,"crnumber":14,"crrevision":1.0,"crcategory":"F","crrelease":"Rel-18","crspecversion":"18.0.0","crtitle":"Correction of protocol in Expected format of evidence"},{"crtdoc":"S3-234951","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.515,"crnumber":11,"crrevision":1.0,"crcategory":"F","crrelease":"Rel-18","crspecversion":"18.0.0","crtitle":"Correction of IE and protocol"},{"crtdoc":"S3-234952","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.514,"crnumber":10,"crrevision":1.0,"crcategory":"F","crrelease":"Rel-18","crspecversion":"18.1.0","crtitle":"Added missing Test Name and Expected format of evidence"},{"crtdoc":"S3-234953","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.926,"crnumber":80,"crrevision":1.0,"crcategory":"F","crrelease":"Rel-18","crspecversion":"18.1.0","crtitle":"Added UDM threat reference for use of an invalid and uncompressed point in ECIES protection scheme for SUCI decryption"},{"crtdoc":"S3-235043","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.514,"crnumber":11,"crrevision":2.0,"crcategory":"F","crrelease":"Rel-18","crspecversion":"18.1.0","crtitle":"Added UDM SCAS test cases for checking an invalid and uncompressed point in ECIES protection scheme for SUCI decryption"},{"crtdoc":"S3-235049","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.117,"crnumber":133,"crrevision":"","crcategory":"F","crrelease":"Rel-18","crspecversion":"18.1.0","crtitle":"Inconsistent use of terms"},{"crtdoc":"S3-235050","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.117,"crnumber":132,"crrevision":1.0,"crcategory":"F","crrelease":"Rel-18","crspecversion":"18.1.0","crtitle":"Disclaimer for Indirect Communication"},{"crtdoc":"S3-235108","crwgdecision":"agreed","crtsgdecision":"approved","crspec":33.117,"crnumber":129,"crrevision":1.0,"crcategory":"F","crrelease":"Rel-18","crspecversion":"18.1.0","crtitle":"Clarification on SCAS Definitions and abbreviations"}],"crsinpacknumber":11}]