aboutsummaryrefslogtreecommitdiffstats
path: root/www/jakarta-tomcat4/Makefile
diff options
context:
space:
mode:
authorznerd <znerd@FreeBSD.org>2002-10-11 06:51:09 +0800
committerznerd <znerd@FreeBSD.org>2002-10-11 06:51:09 +0800
commitadf03ef1a34d84a0a5cbca96c9043cad76d7c181 (patch)
tree0cb1bd7f38c8472f68450aa3455a2f845d60b4fa /www/jakarta-tomcat4/Makefile
parentf281b3df2088d046248138fc57eafa9e6715f6f1 (diff)
downloadfreebsd-ports-gnome-adf03ef1a34d84a0a5cbca96c9043cad76d7c181.tar.gz
freebsd-ports-gnome-adf03ef1a34d84a0a5cbca96c9043cad76d7c181.tar.zst
freebsd-ports-gnome-adf03ef1a34d84a0a5cbca96c9043cad76d7c181.zip
Upgrade to Tomcat 4.0.6, released on 9 October 2002. From the
News & Status page: A security vulnerability has been confirmed to exist in Apache Tomcat 4.0.x releases (including Tomcat 4.0.5), which allows to use a specially crafted URL to return the unprocessed source of a JSP page, or, under special circumstances, a static resource which would otherwise have been protected by security constraint, without the need for being properly authenticated. This is based on a variant of the exploit that was disclosed on 09/24/2002. See: http://jakarta.apache.org/builds/jakarta-tomcat-4.0/release/v4.0.6/RELEASE-NOTES
Diffstat (limited to 'www/jakarta-tomcat4/Makefile')
-rw-r--r--www/jakarta-tomcat4/Makefile3
1 files changed, 1 insertions, 2 deletions
diff --git a/www/jakarta-tomcat4/Makefile b/www/jakarta-tomcat4/Makefile
index a243dad33889..f3f2b6595309 100644
--- a/www/jakarta-tomcat4/Makefile
+++ b/www/jakarta-tomcat4/Makefile
@@ -6,8 +6,7 @@
#
PORTNAME= jakarta-tomcat
-PORTVERSION= 4.0.5
-PORTREVISION= 2
+PORTVERSION= 4.0.6
CATEGORIES= www java
MASTER_SITES= http://jakarta.apache.org/builds/jakarta-tomcat-${PORTVERSION:R}/release/v${PORTVERSION}/bin/ \
http://www.metaverse.nl/~ernst/ \