I tried removing the fedora.war but no dice.  However, right after I tried 
that, I did determine that the problem relates to the fact that we have some 
custom files in this Fedora deployment (it's our test box).  Once I moved them, 
3.3.1 appeared.  Interesting.

Thanks for your input,

Jeremy

-----Original Message-----
From: Chris Wilper [mailto:cwil...@duraspace.org] 
Sent: Thursday, October 21, 2010 9:32 AM
To: fcrepo-user
Subject: Re: [fcrepo-user] Important Security Update for all Fedora Repository 
Installations

Hi Jeremy,

It should definitely say Fedora 3.3.1 if the new jar is in use and the
old one has been removed -- I just double-checked in my own
environment.  If you're using a custom-configured Tomcat or other
servlet container it may be that the original WAR file is being used
rather than what's in the WEB-INF directory.  If that's the case, try
removing the fedora.war file (e.g. in tomcat/webapps/) to make sure
it's using what's in the fedora subdirectory, and not the original war
file.

- Chris

On Thu, Oct 21, 2010 at 7:21 AM, Gottwig, Jeremy M.
(GSFC-272.0)[ZIMMERMAN & ASSOC.] <jeremy.m.gott...@nasa.gov> wrote:
> I deployed these changes today to both 3.3 and a 3.4 installs using the
> process described in the README.  Under fedora/describe on 3.4, I now see
> 3.4.1.  Under 3.3, fedora/describe still says 3.3.  I have verified that the
> original fcrepo-server-3.3.jar is gone, and I restarted Tomcat several times
> in the process of trying to figure out the problem.
>
>
>
> It’s not a huge deal, considering that we have a custom frontend, and both
> Fedora deployments are inaccessible to the public, but I was just curious if
> anyone else has experienced this same behavior.
>
>
>
> From: Daniel Davis [mailto:dda...@fedora-commons.org]
> Sent: Tuesday, October 19, 2010 8:15 PM
> To: Fedora Commons Users
> Subject: [fcrepo-user] Important Security Update for all Fedora Repository
> Installations
>
>
>
> Security Notice from the Fedora Repository Committers:
>
> October 19, 2010
>
> This is a notification that a “Denial of Service” (DOS) vulnerability that
> affects all Fedora Version 2 and 3 versions has been found during code
> review and has been verified in testing.  However, there have been no known
> attacks on any public or private Fedora repository.  Our review indicates
> this vulnerability can corrupt the Fedora database in a way that will cause
> failure of your operating repository.   However, it cannot be used to damage
> your archival storage.  Fortunately, the repository may be recovered through
> the use of the rebuilder utility but until your system is patched it could
> be subject to additional DOS attacks.
>
> A set of patches for Fedora 3.3 and Fedora 3.4 as well as a full release of
> Fedora 3.4.1 in which the issue is fixed has been posted on SourceForge.  We
> ask you contact your repository operator immediately about the issue.  If
> you are using Fedora 3.0 through 3.2, we urge you to update to patched
> copies of Fedora 3.3 or 3.4, or the 3.4.1 release at your earliest
> opportunity.  The security releases may be found at:
>
> http://sourceforge.net/projects/fedora-commons/files/fedora/3.3.1/
> http://sourceforge.net/projects/fedora-commons/files/fedora/3.4.1/
>
> The instructions for installation may be found in the README files at the
> above locations along with the downloads.  Additional information may be
> found on the DuraSpace Wiki in the Fedora Repository 3.4 Documentation
> (http://wiki.duraspace.org/x/AgAU).
>
> Unfortunately, Fedora 2 repositories remain vulnerable; a patch to Fedora 2,
> whose code base was declared at “end-of-life” two years ago, has proven
> beyond our resources at this time. Because of this, we will not being
> providing details about potential exploits in the near term. Fedora 2
> installations are still of great concern to the Fedora committers since we
> know there are many installations in our community who may not be in a
> position to update to the latest Fedora release. We are seeking resources or
> volunteers to fix Fedora 2 but, at this time, we are not able to commit to a
> timeline for this work.
>
> If you cannot update soon please read the following section containing
> suggestions that may help mitigate the vulnerability of your repository.
> Your installation may have minimal risk if Fedora is not directly exposed to
> un-trusted users.  You should:
>
> Restrict access to Field Search including for front applications which pass
> unmodified query parameter text directly from users
> Restrict access from anonymous users for:
>
> API-A Lite “get” operations
> REST API “get” operations
> REST API “findObjects” operations
>
> Restrict ingest of new digital objects from un-trusted users
>
> If you have front-end applications (like Islandora or Muradora) which
> control access, the format of queries, or FOXML ingest or modifications your
> risks are mitigated. It is best if direct access to Fedora is hidden from
> users and only your front-end applications are exposed.   In all cases, we
> recommend close monitoring of your repository.
>
> This notification is to warn operators of production Fedora repositories.
> Please notify us if you have a sudden, unexplained failure of your system.
> As with all software, security issues may arise.  We are collecting contact
> information for a responsible person for each production Fedora systems to
> help the notification process.  Could you or your repository administrator
> please provide us with a suitable contact?  If you know of any other
> production Fedora repositories, could you provide a suitable contact for it?
>
> If you have any questions or are operating a Fedora system in production
> please contact dda...@duraspace.org or cwil...@duraspace.org.
>
> --
>
> Daniel W. Davis
>
> Cornell University, Computing and Information Science
>
> DuraSpace Affiliate
>
> http://duraspace.org
>
> dda...@duraspace.org
>
> dwda...@cs.cornell.edu
>
>
>
> ------------------------------------------------------------------------------
> Nokia and AT&T present the 2010 Calling All Innovators-North America contest
> Create new apps & games for the Nokia N8 for consumers in  U.S. and Canada
> $10 million total in prizes - $4M cash, 500 devices, nearly $6M in marketing
> Develop with Nokia Qt SDK, Web Runtime, or Java and Publish to Ovi Store
> http://p.sf.net/sfu/nokia-dev2dev
> _______________________________________________
> Fedora-commons-users mailing list
> Fedora-commons-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/fedora-commons-users
>
>

------------------------------------------------------------------------------
Nokia and AT&T present the 2010 Calling All Innovators-North America contest
Create new apps & games for the Nokia N8 for consumers in  U.S. and Canada
$10 million total in prizes - $4M cash, 500 devices, nearly $6M in marketing
Develop with Nokia Qt SDK, Web Runtime, or Java and Publish to Ovi Store 
http://p.sf.net/sfu/nokia-dev2dev
_______________________________________________
Fedora-commons-users mailing list
Fedora-commons-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/fedora-commons-users
------------------------------------------------------------------------------
Nokia and AT&T present the 2010 Calling All Innovators-North America contest
Create new apps & games for the Nokia N8 for consumers in  U.S. and Canada
$10 million total in prizes - $4M cash, 500 devices, nearly $6M in marketing
Develop with Nokia Qt SDK, Web Runtime, or Java and Publish to Ovi Store 
http://p.sf.net/sfu/nokia-dev2dev
_______________________________________________
Fedora-commons-users mailing list
Fedora-commons-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/fedora-commons-users

Reply via email to