Wiki source code of V3.5.1
Version 59.1 by Erik Bakker on 2026/02/20 13:45
Show last authors
| author | version | line-number | content |
|---|---|---|---|
| 1 | {{container}} | ||
| 2 | {{container layoutStyle="columns"}}((( | ||
| 3 | |||
| 4 | {{info}}Maintenance update where we primarily updated our Java version from 21.0.9 to 21.0.10. This update includes several security improvements by patching various CVEs. | ||
| 5 | |||
| 6 | This image will be available for all users. If you notice any changed behavior that you believe is caused by this new image, we encourage you to notify us.{{/info}} | ||
| 7 | |||
| 8 | These are the release notes for this runtime image. Once a runtime image is released, every new release will utilize this runtime image as a base for creating runtime images for Docker. For more information, please check out this [[microlearning>>doc:Main.eMagiz Academy.Microlearnings.Crash Course.Crash Course Platform.crashcourse-platform-deploy-execute-deployment-plan-gen3.WebHome||target="blank"]]. | ||
| 9 | |||
| 10 | * Updated our Java version from 21.0.9 to 21.0.10. This update includes several security improvements by patching various CVEs. | ||
| 11 | ** With this Java update, several cipher suites have been disabled. This relates to the remainder of the TLS_RSA cipher suites, which were still enabled on the previous Java versions. eMagiz already did not allow these cipher suites for traffic to the eMagiz cloud (using our Carwash). Therefore, the potential impact of this change is limited to outgoing connectivity, and on-premises deployments. | ||
| 12 | These 6 previously enabled cipher suites are now disabled: | ||
| 13 | *** ((((% border="2" cellpadding="10" cellspacing="10" style="width:1000px" %) | ||
| 14 | |=(% style="width: 45px;" %)Java Cipher|=(% style="width: 241px;" %)OpenSSL | ||
| 15 | |(% style="width:45px" %) TLS_RSA_WITH_AES_128_CBC_SHA|(% style="width:241px" %) [[AES128-SHA (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_128_CBC_SHA/||target="blank"]] | ||
| 16 | |(% style="width:45px" %) TLS_RSA_WITH_AES_128_CBC_SHA256|(% style="width:241px" %) [[AES128-SHA256 (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_128_CBC_SHA256/||target="blank"]] | ||
| 17 | |(% style="width:45px" %) TLS_RSA_WITH_AES_128_GCM_SHA256|(% style="width:241px" %) [[AES128-GCM-SHA256 (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_128_GCM_SHA256/||target="blank"]] | ||
| 18 | |(% style="width:45px" %) TLS_RSA_WITH_AES_256_CBC_SHA|(% style="width:241px" %) [[AES256-SHA (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_256_CBC_SHA/||target="blank"]] | ||
| 19 | |(% style="width:45px" %) TLS_RSA_WITH_AES_256_CBC_SHA256|(% style="width:241px" %) [[AES256-SHA256 (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_256_CBC_SHA256/||target="blank"]] | ||
| 20 | |(% style="width:45px" %) TLS_RSA_WITH_AES_256_GCM_SHA384|(% style="width:241px" %) [[AES256-GCM-SHA384 (External)>>https://ciphersuite.info/cs/TLS_RSA_WITH_AES_256_GCM_SHA384/||target="blank"]] | ||
| 21 | ))) | ||
| 22 | |||
| 23 | * Restore transformation behavior for JSON payloads containing @ characters | ||
| 24 | |||
| 25 | )))((({{toc/}}))){{/container}} | ||
| 26 | {{/container}} |