Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

7.2 Release Notes

Info
titleDSpace 7.2 is coming soonavailable now!

To try out DSpace 7.2

is due on/around Monday, Feb 7. Until then, these release notes are a DRAFT.

immediately, see Try out DSpace 7.   This includes instructions for a quick-install via Docker, as well as information on our sandbox/demo site for DSpace 7.

To upgrade to DSpace 7.2 from 7.x or any prior version, see Upgrading DSpace.

To install DSpace 7.2 for the first time, see Installing DSpace.

DSpace 7.2 provides new features & bug fixes to the 7.x platform.

New and improved features include:

...

The following 15 individuals have contributed directly to the new DSpace (Angular) User Interface in this release (ordered by number of GitHub commits): Giuseppe Digilio (atarix83), William Welling (wwelling), Tim Donohue (tdonohue), Davide Negretti (davidenegretti-4science), Michael Spalti (mspalti), Rezart Vata (rezartatis), Bruno Roemers (bruno-atmire), Lotte Hofstede (LotteHofstede), Art Lowel (artlowel), Yury Bondarenko (ybnd), Corrado Lombardi (corrad82-4s), Kristof De Langhe (Atmire-Kristof), Hardy Pottinger (hardyoyo), Donald I Macdonald (donaldi), Santiago Tettamanti (santit96)

The above contributor lists were determined based on contributions to the "dspace-angular" project in GitHub between 7.1 (after Oct 28, 2021) and 7.2: https://github.com/DSpace/dspace-angular/graphs/contributors?from=2021-10-28&to=2022-02-0203&type=c

Backend / REST API Acknowledgments

...

The above contributor list was determined based on contributions to the "DSpace" project in GitHub between 7.1 (after Oct 28, 2021) and 7.2: https://github.com/DSpace/DSpace/graphs/contributors?from=2021-10-28&to=2022-02-0203&type=c

7.1.1 Release Notes (Backend Only)

Warning
titleAll DSpace 7.0 or 7.1 sites should ensure the backend is upgraded to 7.1.1 (or above) or manually patched

DSpace 7.0 and 7.1 both used a bundled version of the Apache Log4j Library vulnerable to RCE (remote command execution).  The CVE-2021-44228 vulnerability is described in more detail at https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228 and https://logging.apache.org/log4j/2.x/security.html#Fixed_in_Log4j_2.15.0

...