Cloudera Manager 7.12.0.1101

Know more about the Cloudera Manager 7.12.0.1101 hotfix version which is a corresponding Cloudera Manager hotfix version for Cloudera Runtime 7.2.18.1101 service pack release.

This cumulative hotfix was released on July 31, 2025.

Following are the list of known issues and their corresponding workarounds for Cloudera Manager 7.12.0.1101 (version: 7.12.0.1101-68678967):
OPSAPS-72335: HDFS roles does not consume extra_jvm_opts
The extra_jvm_opts configuration in Cloudera Manager is not picked by the hdfs.sh script. Any operations performed using this script will not have access to the extra JVM options that might have been added. This does not affect HDFS service and anything performed directly in HDFS will have the extra opts applied.
None
Avoid using hdfs.sh script and prefer using HDFS commands directly. Alternatively if any command is absolutely required, you can modify the hdfs.sh script to directly include the necessary opts. For example, to add jdk.tls.maxHandshakeMessageSize option to the script before running com.cloudera.cmf.cdhclient.common.hdfs.CreateHdfsDirUtil command, run the following bash ciommand:
if [[ $(grep -c maxHandshakeMessageSize /opt/cloudera/cm-agent/service/hdfs/hdfs.sh) -eq 0 ]]
then
sed -i.bak 's|exec ${JAVA} ${MKDIR_JAVA_OPTS} -cp ${MKDIR_CLASSPATH} com.cloudera.cmf.cdhclient.common.hdfs.CreateHdfsDirUtil ${DIR} ${USER} ${GROUP} ${PERMS} ${MKDIR_FLAGS}|exec ${JAVA} ${MKDIR_JAVA_OPTS} -Djdk.tls.maxHandshakeMessageSize=262144 -cp ${MKDIR_CLASSPATH} com.cloudera.cmf.cdhclient.common.hdfs.CreateHdfsDirUtil ${DIR} ${USER} ${GROUP} ${PERMS} ${MKDIR_FLAGS}|' /opt/cloudera/cm-agent/service/hdfs/hdfs.sh
fi
This code snippet direct modifies the script to include the required options and can be further modified to add any number of such arguments as necessary.
Following are the list of fixed issues that were shipped for Cloudera Manager 7.12.0.1101 (version: 7.12.0.1101-68678967):
OPSAPS-73921: The Proxy server settings are not working correctly for the Telemetry Publisher in Cloudera Manager versions 7.11.3 and higher.
The Proxy server issues are resolved by updating the cdp-sdk-java artifact's version. This issue is now resolved.
OPSAPS-73791: Telemetry Publisher exhibited incorrect behaviour during job uploads by accepting a Status Code 503 response and marking logs as successfully exported.
The issue is now resolved. Telemetry Publisher now treats only Status Code 200 as successful. For non-200 status codes, Telemetry Publisher will now log an error message.
OPSAPS-72739: Snappy native library loading failure
Snappy native library loading fail in certain cluster configurations. This occurs because Snappy attempts to locate its .so files in /var/lib/hive.
This issue is now fixed.
OPSAPS-60642: Host header injection issue on /j_spring_security_check internal endpoint
/j_spring_security_check is internal endpoint which is vulnerable to Host header injection. This issue occurs if the user disabled PREVENT_HOST_HEADER_INJECTION feature flag.
Host header injection: In an incoming HTTP request, web servers often dispatch the request to the target virtual host based on the value supplied in the Host header. Without proper validation of the header value, the attacker can supply invalid input to cause the web server to:
  • Dispatch requests to the first virtual host on the list
  • Redirect to an attacker-controlled domain
  • Perform web cache poisoning
  • Manipulate password reset functionality
This issue is resolved now by adding Feature Flag PREVENT_HOST_HEADER_INJECTION to prevent host header injection vulnerability on /j_spring_security_check internal endpoint. This feature flag is by default enabled and it enables additional logic to block potential Host Header Injection attacks targeting the /j_spring_security_check endpoint in Cloudera Manager.
OPSAPS-73585: Cloudera Observability does not report Spark workloads when Spark event log compression is enabled by setting spark.eventLog.compress enabled to true.
Cloudera Observability now accurately handles compressed event log files. This issue is now resolved.
Fixed Common Vulnerabilities and Exposures

Common Vulnerabilities and Exposures (CVE) that are fixed in Cloudera Manager 7.12.0.1101 hotfix.

CVEs Package Name
CVE-2019-10172 Jackson-mapper-asl
CVE-2024-22201 Jetty
CVE-2025-31672 Apache POI
CVE-2024-38820 Spring Framework
CVE-2025-22228 Spring Security

The repositories for Cloudera Manager 7.12.0.1101 are listed in the following table:

Table 1. Cloudera Manager 7.12.0.1101
Repository Type Repository Location
RHEL 8 Compatible Repository:
https://username:password@archive.cloudera.com/p/cm-public/7.12.0.1101-68678967/redhat8/yum
Repository File:
https://username:password@archive.cloudera.com/p/cm-public/7.12.0.1101-68678967/redhat8/yum/cloudera-manager.repo