Fixed Issues in Apache Solr
Review the list of Solr issues that are resolved in Cloudera Runtime 7.3.1, its service packs and cumulative hotfixes.
Cloudera Runtime 7.3.1.400 SP2
There are no fixed issues in this release.
Cloudera Runtime 7.3.1.300 SP1 CHF 1
There are no fixed issues in this release.
Cloudera Runtime 7.3.1.200 SP1
There are no fixed issues in this release.
Cloudera Runtime 7.3.1.100 CHF 1
There are no fixed issues in this release.
Cloudera Runtime 7.3.1
- OPSAPS-71690: Update control group V2 configuration parameters
- The default values of the control group (CGroup) V2
configuration parameters are updated in Cloudera Manager for the Solr
service. The following table describes the default values of the corresponding V2 parameters.
Parameter name Default values memory.high -1 memory.max -1 io.weight 100 cpu.weight 100 For more information on CGroup V2 parameters, see Configuring Resource Parameters.
Technical Service Bulletins
- TSB-847: CVE-2025-30065 Apache Parquet vulnerability
- On April 1, 2025, a critical vulnerability in the parquet-avro module
of Apache Parquet (CVE-2025-30065, CVSS score 10.0) was announced.
Remediation for affected versions
The Cloudera Search release patched through the Cloudera platform updates for Cloudera on cloud and Cloudera on premises.Vulnerability details
Exploiting this vulnerability is only possible by modifying the accepted schema used for translating Parquet files and subsequently submitting a specifically crafted malicious file.
Schema parsing in the parquet-avro module of Apache Parquet 1.15.0 and previous versions allows bad actors to execute arbitrary code. Attackers may be able to modify unexpected objects or data that was assumed to be safe from modification. Deserialized data or code could be modified without using the provided accessor functions, or unexpected functions could be invoked.
Deserialization vulnerabilities most commonly lead to undefined behavior, such as memory modification or remote code execution.
Action required - Mitigation for affected Cloudera products:
Until the upgrade with Apache Parquet 1.15.1 or higher is available:- Utilize a File Integrity Monitoring (FIM) solution. This allows administrators to monitor files at the filesystem level and receive alerts on any unexpected or suspicious activity in the schema configuration.
- Monitor network activity for any transmission of Parquet files, and alert on any unexpected activity.
- Be cautious with Parquet files from unknown or untrusted sources. If possible, do not process files with uncertain origin or that came from outside the organization.
- Ensure that only authorized users have access to endpoints that ingest Parquet files.
For the latest update on this issue see the corresponding Knowledge Article: TSB 2025-847: Critical Apache Parquet vulnerability CVE-2025-30065