Changes for page V3.5.1

Last modified by Erik Bakker on 2026/02/20 13:46

From version 45.2
edited by Erik Bakker
on 2025/11/19 19:51
Change comment: Update document after refactoring.
To version 60.1
edited by Erik Bakker
on 2026/02/20 13:45
Change comment: There is no comment for this version

Summary

Details

Page properties
Title
... ... @@ -1,1 +1,1 @@
1 -V341
1 +V3.5.1
Content
... ... @@ -1,27 +1,25 @@
1 1  {{container}}
2 2  {{container layoutStyle="columns"}}(((
3 3  
4 -{{warning}}This image will only be available for our flow testing image and for customers running on our Beta image. If you notice any changed behavior during flow testing that you believe is the cause, we encourage you to notify us.{{/warning}}
4 +{{info}}Maintenance update where we primarily updated our Java version from 21.0.9 to 21.0.10. This update includes several security improvements by patching various CVEs.
5 5  
6 +This image will be available for all users. If you notice any changed behavior that you believe is caused by this new image, we encourage you to notify us.{{/info}}
7 +
6 6  These are the release notes for this runtime image. Once a runtime image is released, every new release will utilize this runtime image as a base for creating runtime images for Docker. For more information, please check out this [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Crash Course.Crash Course Platform.crashcourse-platform-deploy-execute-deployment-plan-gen3.WebHome||target="blank"]].
7 7  
8 -====New features====
10 +* Updated our Java version from 21.0.9 to 21.0.10. This update includes several security improvements by patching various CVEs.
11 +** With this Java update, several cipher suites have been disabled. This relates to the remainder of the TLS_RSA cipher suites, which were still enabled on the previous Java versions. eMagiz already did not allow these cipher suites for traffic to the eMagiz cloud (using our Carwash). Therefore, the potential impact of this change is limited to outgoing connectivity, and on-premises deployments. These 6 previously enabled cipher suites are now disabled:
12 +*** ((((% border="2" cellpadding="10" cellspacing="10" style="width:1000px" %)
13 +|=(% style="width: 45px;" %)Java Cipher|=(% style="width: 241px;" %)OpenSSL
14 +|(% style="width:45px" %) TLS_RSA_WITH_AES_128_CBC_SHA|(% style="width:241px" %) [[AES128-SHA (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_128_CBC_SHA/||target="blank"]]
15 +|(% style="width:45px" %) TLS_RSA_WITH_AES_128_CBC_SHA256|(% style="width:241px" %) [[AES128-SHA256 (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_128_CBC_SHA256/||target="blank"]]
16 +|(% style="width:45px" %) TLS_RSA_WITH_AES_128_GCM_SHA256|(% style="width:241px" %) [[AES128-GCM-SHA256 (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_128_GCM_SHA256/||target="blank"]]
17 +|(% style="width:45px" %) TLS_RSA_WITH_AES_256_CBC_SHA|(% style="width:241px" %) [[AES256-SHA (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_256_CBC_SHA/||target="blank"]]
18 +|(% style="width:45px" %) TLS_RSA_WITH_AES_256_CBC_SHA256|(% style="width:241px" %) [[AES256-SHA256 (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_256_CBC_SHA256/||target="blank"]]
19 +|(% style="width:45px" %) TLS_RSA_WITH_AES_256_GCM_SHA384|(% style="width:241px" %) [[AES256-GCM-SHA384 (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_256_GCM_SHA384/||target="blank"]]
20 +)))
9 9  
10 -* Added support for automated configuration of API gateway containers, effectively making the gateway infra flow redundant about the security-related support objects. This feature will be rolled out with the introduction of Multiple Authentication Methods for API gateways.
11 -
12 -====Minor changes===
22 +* Restore transformation behavior for JSON payloads containing @ characters
13 13  
14 -* Manage/Error Messages: Increased the maximum amount of displayed error message headers from 40 to 60.
15 -
16 -====Bug fixes====
17 -
18 -* Updated libraries below to implement a bugfix where, for some SFTP servers, storing files with mode ‘append’ would result in using an ‘insert’ mode instead. For example, sending the content 123456 to a file that currently has content abcdefghi would result in output 123456ghi instead of abcdefghi123456
19 -** Updated library org.apache.sshd:sshd-common from 2.14.0 to 2.16.0
20 -** Updated library org.apache.sshd:sshd-core from 2.14.0 to 2.16.0
21 -** Updated library org.apache.sshd:sshd-sftp from 2.14.0 to 2.16.0
22 -* When using a web service outbound gateway with a custom SSL web service message sender, the web senders' attributes, such as credentials and timeouts, were not applied to outgoing requests.
23 -* Upgraded our Java runtime from 17 to 21.
24 -** Enabled Java’s virtual threads, improving overall throughput and reducing overhead. This results in a minor change where the stack trace in error messages may no longer show the ‘… xx common frames omitted’ as part of the stack trace
25 -
26 26  )))((({{toc/}}))){{/container}}
27 27  {{/container}}