Changes for page V3.5.1
Last modified by Erik Bakker on 2026/02/20 13:46
From version 45.1
edited by Erik Bakker
on 2025/10/21 10:52
on 2025/10/21 10:52
Change comment:
There is no comment for this version
To version 58.1
edited by Erik Bakker
on 2026/02/20 13:45
on 2026/02/20 13:45
Change comment:
There is no comment for this version
Summary
-
Page properties (2 modified, 0 added, 0 removed)
Details
- Page properties
-
- Title
-
... ... @@ -1,1 +1,1 @@ 1 -V3. 4.01 +V3.5.1 - Content
-
... ... @@ -1,27 +1,27 @@ 1 1 {{container}} 2 2 {{container layoutStyle="columns"}}((( 3 3 4 -{{ warning}}This image will only beavailablefor ourflowtestingimageandforcustomersrunningonourBetaimage.Ifyounoticeanychangedbehaviorduring flowtesting thatyoubelieveis thecause,weencourageyouto notify us.{{/warning}}4 +{{info}}Maintenance update where we primarily updated our Java version from 21.0.9 to 21.0.10. This update includes several security improvements by patching various CVEs. 5 5 6 +This image will be available for all users. If you notice any changed behavior that you believe is caused by this new image, we encourage you to notify us.{{/info}} 7 + 6 6 These are the release notes for this runtime image. Once a runtime image is released, every new release will utilize this runtime image as a base for creating runtime images for Docker. For more information, please check out this [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Crash Course.Crash Course Platform.crashcourse-platform-deploy-execute-deployment-plan-gen3.WebHome||target="blank"]]. 7 7 8 -====New features==== 10 +* Updated our Java version from 21.0.9 to 21.0.10. This update includes several security improvements by patching various CVEs. 11 +** With this Java update, several cipher suites have been disabled. This relates to the remainder of the TLS_RSA cipher suites, which were still enabled on the previous Java versions. eMagiz already did not allow these cipher suites for traffic to the eMagiz cloud (using our Carwash). Therefore, the potential impact of this change is limited to outgoing connectivity, and on-premises deployments. 12 +These 6 previously enabled cipher suites are now disabled: 9 9 10 -* Added support for automated configuration of API gateway containers, effectively making the gateway infra flow redundant about the security-related support objects. This feature will be rolled out with the introduction of Multiple Authentication Methods for API gateways. 11 - 12 -====Minor changes=== 14 +*** ((((% border="2" cellpadding="10" cellspacing="10" style="width:1000px" %) 15 +|=(% style="width: 45px;" %)Java Cipher|=(% style="width: 241px;" %)OpenSSL 16 +|(% style="width:45px" %) TLS_RSA_WITH_AES_128_CBC_SHA|(% style="width:241px" %) [[AES128-SHA (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_128_CBC_SHA/||target="blank"]] 17 +|(% style="width:45px" %) TLS_RSA_WITH_AES_128_CBC_SHA256|(% style="width:241px" %) [[AES128-SHA256 (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_128_CBC_SHA256/||target="blank"]] 18 +|(% style="width:45px" %) TLS_RSA_WITH_AES_128_GCM_SHA256|(% style="width:241px" %) [[AES128-GCM-SHA256 (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_128_GCM_SHA256/||target="blank"]] 19 +|(% style="width:45px" %) TLS_RSA_WITH_AES_256_CBC_SHA|(% style="width:241px" %) [[AES256-SHA (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_256_CBC_SHA/||target="blank"]] 20 +|(% style="width:45px" %) TLS_RSA_WITH_AES_256_CBC_SHA256|(% style="width:241px" %) [[AES256-SHA256 (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_256_CBC_SHA256/||target="blank"]] 21 +|(% style="width:45px" %) TLS_RSA_WITH_AES_256_GCM_SHA384|(% style="width:241px" %) [[AES256-GCM-SHA384 (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_256_GCM_SHA384/||target="blank"]] 22 +))) 13 13 14 -* Manage/ErrorMessages:Increased themaximum amountofdisplayederror messageheadersfrom 40 to 60.24 +* Restore transformation behavior for JSON payloads containing @ characters 15 15 16 -====Bug fixes==== 17 - 18 -* Updated libraries below to implement a bugfix where, for some SFTP servers, storing files with mode ‘append’ would result in using an ‘insert’ mode instead. For example, sending the content 123456 to a file that currently has content abcdefghi would result in output 123456ghi instead of abcdefghi123456 19 -** Updated library org.apache.sshd:sshd-common from 2.14.0 to 2.16.0 20 -** Updated library org.apache.sshd:sshd-core from 2.14.0 to 2.16.0 21 -** Updated library org.apache.sshd:sshd-sftp from 2.14.0 to 2.16.0 22 -* When using a web service outbound gateway with a custom SSL web service message sender, the web senders' attributes, such as credentials and timeouts, were not applied to outgoing requests. 23 -* Upgraded our Java runtime from 17 to 21. 24 -** Enabled Java’s virtual threads, improving overall throughput and reducing overhead. This results in a minor change where the stack trace in error messages may no longer show the ‘… xx common frames omitted’ as part of the stack trace 25 - 26 26 )))((({{toc/}}))){{/container}} 27 27 {{/container}}