Changes for page V3.5.1
Last modified by Erik Bakker on 2026/02/20 13:46
From version 53.1
edited by Erik Bakker
on 2026/01/15 09:40
on 2026/01/15 09:40
Change comment:
There is no comment for this version
To version 55.1
edited by Erik Bakker
on 2026/02/20 13:38
on 2026/02/20 13:38
Change comment:
There is no comment for this version
Summary
-
Page properties (2 modified, 0 added, 0 removed)
Details
- Page properties
-
- Title
-
... ... @@ -1,1 +1,1 @@ 1 -V3.5. 01 +V3.5.1 - Content
-
... ... @@ -1,12 +1,28 @@ 1 1 {{container}} 2 2 {{container layoutStyle="columns"}}((( 3 3 4 -{{info}}Maintenance update where we primarily updated Spring Boot fromversion3.4.1to3.5.8and ensured all our external librariesareup-to-date.All changesare listed below.Changesinremoved and added libraries originatefromupdatingtheversion, which may incur a change in thestructureof that library.4 +{{info}}Maintenance update where we primarily updated our Java version from 21.0.9 to 21.0.10. This update includes several security improvements by patching various CVEs. 5 5 6 6 This image will be available for all users. If you notice any changed behavior that you believe is caused by this new image, we encourage you to notify us.{{/info}} 7 7 8 8 These are the release notes for this runtime image. Once a runtime image is released, every new release will utilize this runtime image as a base for creating runtime images for Docker. For more information, please check out this [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Crash Course.Crash Course Platform.crashcourse-platform-deploy-execute-deployment-plan-gen3.WebHome||target="blank"]]. 9 9 10 +* Updated our Java version from 21.0.9 to 21.0.10. This update includes several security improvements by patching various CVEs. 11 +** With this Java update, several cipher suites have been disabled. This relates to the remainder of the TLS_RSA cipher suites, which were still enabled on the previous Java versions. eMagiz already did not allow these cipher suites for traffic to the eMagiz cloud (using our Carwash). Therefore, the potential impact of this change is limited to outgoing connectivity, and on-premises deployments. 12 +These 6 previously enabled cipher suites are now disabled: 13 + 14 +((((% border="2" cellpadding="10" cellspacing="10" style="width:292px" %) 15 +|=(% style="width: 45px;" %)#|=(% style="width: 241px;" %)Option 16 +|(% style="width:45px" %) a|(% style="width:241px" %) OAuth 2.0 - Authorization Code 17 +|(% style="width:45px" %) b|(% style="width:241px" %) REST - Basic Auth 18 +|(% style="width:45px" %) c|(% style="width:241px" %) REST - Client Certificate 19 +|(% style="width:45px" %) d|(% style="width:241px" %) REST - Header Mapper 20 +|(% style="width:45px" %) e|(% style="width:241px" %) OAuth 2.0 - Client Credentials 21 +|(% style="width:45px" %) f|(% style="width:241px" %) REST - SSL 22 +|(% style="width:45px" %) g|(% style="width:241px" %) Dynamic Token 23 +|(% style="width:45px" %) h|(% style="width:241px" %) Token 24 +|(% style="width:45px" %) i|(% style="width:241px" %) No Authentication 25 +))) 10 10 ==Removed libraries== 11 11 * Removed library net.shibboleth.utilities:java-support 8.0.0 12 12 * Removed library org.opensaml:opensaml-core 4.3.2 ... ... @@ -101,9 +101,6 @@ 101 101 * Updated library org.apache.kafka:kafka-clients from 3.8.1 to 3.9.1 102 102 * Updated library org.apache.qpid:qpid-jms-client from 2.6.1 to 2.9.0 103 103 * Updated library org.apache.santuario:xmlsec from 4.0.2 to 4.0.4 104 -* Updated library org.apache.sshd:sshd-common from 2.16.0 to 2.15.0 105 -* Updated library org.apache.sshd:sshd-core from 2.16.0 to 2.15.0 106 -* Updated library org.apache.sshd:sshd-sftp from 2.16.0 to 2.15.0 107 107 * Updated library org.apache.tomcat.embed:tomcat-embed-core from 10.1.34 to 10.1.49 108 108 * Updated library org.apache.tomcat.embed:tomcat-embed-el from 10.1.34 to 10.1.49 109 109 * Updated library org.apache.tomcat.embed:tomcat-embed-websocket from 10.1.34 to 10.1.49