system environment/base

pam - 응용프로그램에서 사용할 수 있는 인증을 제공하는 확장 라이브러리

Website: http://www.linux-pam.org/
License: BSD and GPLv2+
Vendor: AnNyung Packaging Team
Description:
PAM (Pluggable Authentication Modules) is a system security tool that
allows system administrators to set authentication policy without
having to recompile programs that handle authentication.

Packages

pam-1.1.1-24.an2.src [1.3 MiB] Changelog by JoungKyun.Kim (2017-03-21):
- pam_faillock: support permanent locking of user with unlock_time=never option
- pam_succeed_if: properly work with large uids
- pam_unix: add no_pass_expiry option for ignoring password
  expiration in crond and sshd with public key authentication
- pam_access: check for (group) match first (#1359303)
pam-1.1.1-22.an2.src [1.2 MiB] Changelog by Tomáš Mráz (2016-01-07):
- pam_tally2: added no_lockf_timeout option, do not use it
- pam_tally2: added debug option
- pam_tally2: do not create the log file as executable (#1186361)
- add manpage symlink for environment(5) (#1110258)
- pam_group: add support for Development/Debug syntax (#1114220)
pam-1.1.1-20.an2.1.3.src [1.2 MiB] Changelog by JoungKyun.Kim (2016-03-08):
- fixed password expired message
pam-1.1.1-20.an2.1.2.src [1.2 MiB] Changelog by JoungKyun.Kim (2016-02-19):
- fixed print debug messages
pam-1.1.1-20.an2.1.1.src [1.2 MiB] Changelog by JoungKyun.Kim (2016-02-18):
- skip password expire check
  1. exists list of /etc/login.defs.exception
  2. exists google opt secret file(~/.ssh/google-authenticator)
pam-1.1.1-20.an2.1.src [1.2 MiB] Changelog by Tomáš Mráz (2015-08-04):
- security issues
  . CVE-2015-3238 - DoS due to blocking pipe with very long password
pam-1.1.1-20.an2.src [1.2 MiB] Changelog by JoungKyun.Kim (2014-10-20):
- rebuild for AnNyung 2.4
- https://rhn.redhat.com/errata/RHBA-2014-1579.html
pam-1.1.1-17.an2.src [1.2 MiB] Changelog by JoungKyun.Kim (2013-11-24):
- several bug fix
  http://rhn.redhat.com/errata/RHEA-2013-1734.html
pam-1.1.1-13.an2.src [1.2 MiB] Changelog by JoungKyun.Kim (2013-03-11):
- security issues
  . CVE-2011-3148
    Stack-based buffer overflow in the _assemble_line function in
    modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows
    local users to cause a denial of service (crash) and possibly execute
    arbitrary code via a long string of white spaces at the beginning of
    the ~/.pam_environment file.
pam-1.1.1-10.an2.1.src [1.2 MiB] Changelog by JoungKyun.Kim (2012-04-19):
- patched chroot module
pam-1.1.1-10.an2.src [1.2 MiB] Changelog by JoungKyun.Kim (2012-01-21):
- patched chroot module

Listing created by Repoview-0.6.6-1.el6