Changes for page V3.5.1

Last modified by Erik Bakker on 2026/02/20 13:46

From version 61.1
edited by Erik Bakker
on 2026/02/20 13:46
Change comment: There is no comment for this version
To version 40.1
edited by Erik Bakker
on 2025/04/22 14:07
Change comment: There is no comment for this version

Summary

Details

Page properties
Title
... ... @@ -1,1 +1,1 @@
1 -V3.5.1
1 +V3.3.1
Content
... ... @@ -1,25 +1,12 @@
1 1  {{container}}
2 2  {{container layoutStyle="columns"}}(((
3 3  
4 -{{info}}Maintenance update where we primarily updated our Java version from 21.0.9 to 21.0.10. This update includes several security improvements by patching various CVEs.
4 +These are the release notes for this runtime image. Once a runtime image is released, every new release will utilize this runtime image as a base for creating runtime images for docker. For more information, please check out this [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Crash Course.Crash Course Platform.crashcourse-platform-deploy-execute-deployment-plan-gen3.WebHome||target="blank"]].
5 5  
6 -This image will be available for all users. If you notice any changed behavior that you believe is caused by this new image, we encourage you to notify us.{{/info}}
6 +====Bug fixes====
7 7  
8 -These are the release notes for this runtime image. Once a runtime image is released, every new release will utilize this runtime image as a base for creating runtime images for Docker. For more information, please check out this [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Crash Course.Crash Course Platform.crashcourse-platform-deploy-execute-deployment-plan-gen3.WebHome||target="blank"]].
8 +* Support for the ‘NTCredentials’ authentication method in a custom HttpComponentsMessageSender support object has been reintroduced.
9 +* In some edge cases, log messages produced with the Logging channel adapter component did not reach the Manage phase. This issue is now resolved.
9 9  
10 -* Updated our Java version from 21.0.9 to 21.0.10. This update includes several security improvements by patching various CVEs.
11 -** With this Java update, several cipher suites have been disabled. This relates to the remainder of the TLS_RSA cipher suites, which were still enabled on the previous Java versions. eMagiz already did not allow these cipher suites for traffic to the eMagiz cloud (using our Carwash). Therefore, the potential impact of this change is limited to outgoing connectivity, and on-premises deployments. These 6 previously enabled cipher suites are now disabled:
12 -*** ((((% border="2" cellpadding="10" cellspacing="10" style="width:1000px" %)
13 -|=(% style="width: 45px;" %)Java Cipher|=(% style="width: 241px;" %)OpenSSL
14 -|(% style="width:45px" %) TLS_RSA_WITH_AES_128_CBC_SHA|(% style="width:241px" %) [[AES128-SHA (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_128_CBC_SHA/||target="blank"]]
15 -|(% style="width:45px" %) TLS_RSA_WITH_AES_128_CBC_SHA256|(% style="width:241px" %) [[AES128-SHA256 (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_128_CBC_SHA256/||target="blank"]]
16 -|(% style="width:45px" %) TLS_RSA_WITH_AES_128_GCM_SHA256|(% style="width:241px" %) [[AES128-GCM-SHA256 (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_128_GCM_SHA256/||target="blank"]]
17 -|(% style="width:45px" %) TLS_RSA_WITH_AES_256_CBC_SHA|(% style="width:241px" %) [[AES256-SHA (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_256_CBC_SHA/||target="blank"]]
18 -|(% style="width:45px" %) TLS_RSA_WITH_AES_256_CBC_SHA256|(% style="width:241px" %) [[AES256-SHA256 (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_256_CBC_SHA256/||target="blank"]]
19 -|(% style="width:45px" %) TLS_RSA_WITH_AES_256_GCM_SHA384|(% style="width:241px" %) [[AES256-GCM-SHA384 (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_256_GCM_SHA384/||target="blank"]]
20 -)))
21 -
22 -* Restore transformation behavior for JSON payloads containing @ characters
23 -
24 24  )))((({{toc/}}))){{/container}}
25 25  {{/container}}