Fixed Issues in Cloudera Runtime 7.2.18.1101
You can review the list of reported issues and their fixes in Cloudera Runtime 7.2.18.1101.
- CDPD-84166: Make
details
andsparkPlanDescription
fields optional in Spark Atlas Connector - Backports a change to Spark Atlas Connector to implement the configuration property
atlas.spark.plan.enabled
in Cloudera Manager. When set totrue
(default), the fields can be used as before. When set tofalse
, it reduces memory usage, but removes thedetails
andsparkPlanDescription
fields from the Atlas UI. - CDPD-67359: Improved S3 directory listing in Hue for large datasets
- Previously, Hue encountered "incorrect signature" errors when attempting to list S3 directories containing 1,000 or more objects. This issue was caused by S3's pagination mechanism, where the marker field for subsequent requests was not correctly passed to the Ranger Authorization Service (RAZ). As a result, the signature generated by RAZ did not align with the actual S3 request, leading to verification failures.
- CDPD-81943: Phoenix Salted Table Range Scan Issue
- During a range scan operation on a salted table, data residing in the final salt bucket may not be fully scanned. This issue occurs under specific conditions related to region splits, affecting the salted tables configured for distributed data storage to optimize performance.
- CDPD-82221: Derby upgrade
- The issue was resolved by upgrading Derby from version 10.14.2.0 to an internal Cloudera release 10.14.3.0-cloudera1. This upgrade addresses the identified security vulnerabilities.
- CDPD-83361: Jetty upgrade and mina-core exclusion
- The issue was resolved by upgrading Jetty to version 9.4.57.v20241219 and excluding the mina-core package. This addresses the identified security vulnerabilities.
- CDPD-83421: Commons-IO upgrade
- Upgraded the commons-io package to version 2.16.1. This upgrade addresses the identified security vulnerabilities.
- CDPD-82898: Impala query stability with Iceberg complex types
- In 7.2.18, queries failed when reading or writing complex data types with Hive, specifically on Iceberg tables. This resulted in an execution error related to Parquet file handling, which was introduced after a recent Iceberg version upgrade.
- Fixed Common Vulnerabilities and Exposures
-
The Common Vulnerabilities and Exposures (CVEs) that are fixed in this release are:
- CVE-2022-46337 - Apache Derby