Cloudera Manager 7.12.0.1101
Know more about the Cloudera Manager 7.12.0.1101 hotfix version which is a corresponding Cloudera Manager hotfix version for Cloudera Runtime 7.2.18.1101 service pack release.
This cumulative hotfix was released on July 31, 2025.
Following are the list of known issues and their corresponding
workarounds for Cloudera Manager 7.12.0.1101 (version: 7.12.0.1101-68678967):
- OPSAPS-72335: HDFS roles does not consume extra_jvm_opts
- The extra_jvm_opts configuration in
Cloudera Manager is not picked by the
hdfs.sh
script. Any operations performed using this script will not have access to the extra JVM options that might have been added. This does not affect HDFS service and anything performed directly in HDFS will have the extra opts applied.
Following are the list of fixed issues that were shipped for
Cloudera Manager 7.12.0.1101 (version: 7.12.0.1101-68678967):
- OPSAPS-73921: The Proxy server settings are not working correctly for the Telemetry Publisher in Cloudera Manager versions 7.11.3 and higher.
- The Proxy server issues are resolved by updating the cdp-sdk-java artifact's version. This issue is now resolved.
- OPSAPS-73791: Telemetry Publisher exhibited incorrect behaviour during job uploads by accepting a Status Code 503 response and marking logs as successfully exported.
- The issue is now resolved. Telemetry Publisher now treats only Status Code 200 as successful. For non-200 status codes, Telemetry Publisher will now log an error message.
- OPSAPS-72739: Snappy native library loading failure
- Snappy native library loading fail in certain cluster
configurations. This occurs because Snappy attempts to locate its
.so
files in /var/lib/hive. - OPSAPS-60642: Host header injection issue on
/j_spring_security_check
internal endpoint /j_spring_security_check
is internal endpoint which is vulnerable to Host header injection. This issue occurs if the user disabledPREVENT_HOST_HEADER_INJECTION
feature flag.Host header injection: In an incoming HTTP request, web servers often dispatch the request to the target virtual host based on the value supplied in the Host header. Without proper validation of the header value, the attacker can supply invalid input to cause the web server to:- Dispatch requests to the first virtual host on the list
- Redirect to an attacker-controlled domain
- Perform web cache poisoning
- Manipulate password reset functionality
- OPSAPS-73585: Cloudera Observability does not report Spark workloads when Spark event log compression is enabled by setting spark.eventLog.compress enabled to true.
- Cloudera Observability now accurately handles compressed event log files. This issue is now resolved.
- Fixed Common Vulnerabilities and Exposures
-
Common Vulnerabilities and Exposures (CVE) that are fixed in Cloudera Manager 7.12.0.1101 hotfix.
The repositories for Cloudera Manager 7.12.0.1101 are listed in the following table:
Repository Type | Repository Location |
---|---|
RHEL 8 Compatible | Repository: Repository
File:
|