Jump to letter: [
ABCDFGHILMNOPRSTUVX
]
pam - 응용프로그램에서 사용할 수 있는 인증을 제공하는 확장 라이브러리
- Description:
PAM (Pluggable Authentication Modules) is a system security tool that
allows system administrators to set authentication policy without
having to recompile programs that handle authentication.
Packages
pam-1.1.1-24.an2.i686
[980 KiB] |
Changelog
by JoungKyun.Kim (2017-03-21):
- pam_faillock: support permanent locking of user with unlock_time=never option
- pam_succeed_if: properly work with large uids
- pam_unix: add no_pass_expiry option for ignoring password
expiration in crond and sshd with public key authentication
- pam_access: check for (group) match first (#1359303)
|
pam-1.1.1-22.an2.i686
[660 KiB] |
Changelog
by Tomáš Mráz (2016-01-07):
- pam_tally2: added no_lockf_timeout option, do not use it
- pam_tally2: added debug option
- pam_tally2: do not create the log file as executable (#1186361)
- add manpage symlink for environment(5) (#1110258)
- pam_group: add support for Development/Debug syntax (#1114220)
|
pam-1.1.1-20.an2.1.3.i686
[979 KiB] |
Changelog
by JoungKyun.Kim (2016-03-08):
- fixed password expired message
|
pam-1.1.1-20.an2.1.2.i686
[978 KiB] |
Changelog
by JoungKyun.Kim (2016-02-19):
- fixed print debug messages
|
pam-1.1.1-20.an2.1.1.i686
[979 KiB] |
Changelog
by JoungKyun.Kim (2016-02-18):
- skip password expire check
1. exists list of /etc/login.defs.exception
2. exists google opt secret file(~/.ssh/google-authenticator)
|
pam-1.1.1-20.an2.1.i686
[976 KiB] |
Changelog
by Tomáš Mráz (2015-08-04):
- security issues
. CVE-2015-3238 - DoS due to blocking pipe with very long password
|
pam-1.1.1-20.an2.i686
[977 KiB] |
Changelog
by JoungKyun.Kim (2014-10-20):
- rebuild for AnNyung 2.4
- https://rhn.redhat.com/errata/RHBA-2014-1579.html
|
pam-1.1.1-17.an2.i686
[975 KiB] |
Changelog
by JoungKyun.Kim (2013-11-24):
- several bug fix
http://rhn.redhat.com/errata/RHEA-2013-1734.html
|
pam-1.1.1-13.an2.i686
[974 KiB] |
Changelog
by JoungKyun.Kim (2013-03-11):
- security issues
. CVE-2011-3148
Stack-based buffer overflow in the _assemble_line function in
modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows
local users to cause a denial of service (crash) and possibly execute
arbitrary code via a long string of white spaces at the beginning of
the ~/.pam_environment file.
|
pam-1.1.1-10.an2.1.i686
[1.1 MiB] |
Changelog
by JoungKyun.Kim (2012-04-19):
- patched chroot module
|