Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Note
titleWe highly recommend any users of DSpace 3.x (or below) upgrade to 3.46

DSpace 3.4 6 contains security fixes for both the XMLUI. To ensure your XMLUI 3.x site is secure, we highly recommend XMLUI DSpace 3.x users upgrade to DSpace 3.6. See the DSpace Release 3.6 Notes for further details. DSpace 3.6 upgrade instructions are available at: Upgrading a DSpace Installation

DSpace 3.5 contains security fixes for the XMLUI and JSPUI. To ensure your JSPUI 3.x site is secure, we highly recommend all JSPUI DSpace 3.x users upgrade to DSpace 3.5 (or above).  See the DSpace Release 3.5 Notes for further details.

DSpace 3.4 contained security fixes for both the XMLUI and JSPUI. See the DSpace Release 3.4 Notes for further details.

We also highly recommend removing any  "allowLinking=true" settings from your Tomcat <Context> settings. Previously our installation documentation erroneously listed examples which included "allowLinking=true", while the Tomcat documentation lists it as a possible security concern.

Note
titleWe highly recommend DSpace 1.x.x users upgrade to DSpace 3.46, 4.3 5 or 5.15

If you are running an older, unsupported version of DSpace (1.x.x), we highly recommend upgrading to DSpace 3.46, DSpace 4.35 or DSpace 5.15 to ensure your site is secure. Several of these security vulnerabilities also affect sites which are running DSpace 1.x releases. Per our DSpace Software Support Policy, all DSpace 1.x.x versions are now End-Of-Life.

If you are considering an upgrade from DSpace 1.x.x, note that, as of DSpace 5, your existing data (i.e. database contents, search/browse indexes) will now be automatically upgraded from ANY prior version of DSpace. Therefore, you may wish to consider upgrading directly to DSpace 5.1x, as the 5.x upgrade process is simplified.

Welcome to Release 3.46. DSpace 3.4 6 provides XMLUI security fixes to the 3.x platform. For full details on the fixes/patches/improvement, please visit:

...