- CDPD-91064: USER role accounts to access only their
own user details
- 7.3.2
- Fixed an issue where Ranger users with only the USER
role could retrieve details of admin or keyadmin users with similar
usernames via the
/service/xusers/users API. The API now
restricts USER-role accounts to accessing only their own user details.
- CDPD-90358: Hostname verification issue
- 7.3.2
- Fixed an issue in Ranger where hostname verification
did not correctly validate the hostname across the certificate chain,
improving SSL/TLS security for secured connections.
- CDPD-87716: Ranger RAZ on S3 path with encoded
characters
- 7.3.2
- Fixed an issue where Ranger RAZ did not correctly
evaluate S3 access policies for Iceberg table partitions when the S3 path
contained encoded characters (for example, the
= in
partition directory names encoded by the AWS SDK v2). Because the encoded
path was not decoded before policy evaluation, deny policies on those
partition directories were not applied as expected. The path is now decoded
prior to authorization checks, ensuring that deny policies on Iceberg
partition directories are honored correctly.
- CDPD-85478: [GDS] Dataset details not visible in
Ranger access logs for RMS enforcement
- 7.3.2
- Fixed an issue where, for RMS enforcement cases,
Ranger access logs showed only the dataset policy ID but did not include the
corresponding GDS dataset details. Audit entries now correctly capture the
GDS dataset information for RMS-enforced datasets.
- CDPD-82386: Ranger does not clean up stale plugin
entries after role deletion or migration
- 7.3.2
- Ranger now provides supported REST APIs to remove
stale plugin status entries from Ranger Admin. Previously, plugin records
for deleted or migrated service roles were not cleaned up and continued to
appear under Audits > Plugin Status, causing confusion about plugin
health and forcing risky manual database updates. The fix introduces
ranger-admin endpoints to delete obsolete plugin entries either by ID or by
attributes (such as service name, plugin host name, and application type),
allowing administrators to safely clean up outdated plugin information and
keep the Plugin Status view accurate.
- CDPD-81148: Ranger enters an infinite loop and
generate persistent database errors
- 7.3.2
- Fixed an issue where Ranger could enter an infinite
loop and generate persistent database errors when concurrent sessions
updated or deleted the same policy, role, or tag. Tasks scheduled to run
after the main transaction (for example, policy label updates, role version
updates, and tag version updates) are now processed correctly, preventing
infinite loops and ensuring that database errors no longer require a Ranger
restart to recover.
- CDPD-80625: Improved exception handling for RAZ GCP
HMAC keys
- 7.3.2
- Resolved an issue in the RAZ GCP HMAC key generation
lifecycle by ignoring transient storage exceptions and retrying key
retrieval a few times, and improved related logging. This makes HMAC key
creation and deletion more reliable for GCP RAZ integrations.
- CDPD-79459: RMS full-sync fails with unsupported Hive
table location schemes
- 7.3.2
- Previously, Ranger RMS full-sync could fail with an
exception when Hive table locations were stored on file systems that RMS
does not support (for example, Azure
abfss), causing
full-sync to stop before completion.This issue has been fixed by skipping
unsupported file schema types when processing table and database
metadata during RMS full-sync and delta-sync. Ranger RMS ACL
synchronization now continues for supported file schemes, and locations
on unsupported file systems are not mapped; instead, an informational
message is logged in the RMS server logs.
- CDPD-78321: Performance fixes for Ozone plugin
- 7.3.2
- Fixed the following performance issues observed while
evaluating policies for multi-level resources:
- RANGER-4893: Improves policy evaluation for multi level resource
hierarchies.
- RANGER-4922: Reduces time to find tags associated with multi-level
resources.
- CDPD-78151: Added configuration to control append mode
for HDFS audit writes
- 7.3.2
- A new configuration parameter was added to Ranger to
control whether APPEND mode is used when writing audits to HDFS after errors
or exceptions. Previously, Ranger would attempt to append to existing HDFS
audit files in such cases (falling back to WRITE mode if append was not
possible) to avoid generating a large number of small audit files. With this
change, administrators can explicitly enable or disable the use of APPEND
mode for HDFS audit writes, allowing better control over audit file handling
in specific deployment scenarios.
- CDPD-77949: CSV injection vulnerability during
CSV/Excel export from Ranger Admin
- 7.3.2
- Fixed an issue that could allow CSV injection during
CSV and Excel exports from Ranger Admin (CVE-2024-55532). The export of
Ranger policies to CSV/Excel has been removed from the Ranger Admin UI, and
the affected export APIs have been deprecated.
- CDPD-76633: Ranger RMS server throws
ConcurrentModificationException
- 7.3.2
- Previously, the Ranger RMS server could enter an
unrecoverable error state with a
ConcurrentModificationException when large service
resource mappings were downloaded to the NameNode while Hive metadata
changes were being applied. This could lead to follow‑on errors when
fetching resource‑mapping deltas and no clear path to restore the RMS server
to a normal state. The fix ensures that RMS now uses a shallow copy of
the service resource mappings before applying deltas, so the mappings
are not modified while they are being serialized for download,
preventing the ConcurrentModificationException and
stabilizing RMS behavior under concurrent load.
- CDPD-75532: Remove self node from the resourceTrie
only if it has no children, no evaluators and no wildcard-evaluators
- 7.3.2
- When two policies have a common subset of resources
and are defined on the same user (or subset of users, through groups or
direct users), if one of these policies is modified (on anything: name,
resource, user), it is the only one in effect during access evaluation,
until a restart of the underlying service.
- This issue has been fixed now.
- CDPD-74403: Fixed hardcoded parcel path and sql driver
in authzmigrator
- 7.3.2
- Fixed an issue where the
authzmigrator/
authz-export.sh script failed with
NoClassDefFoundError: javax/jdo/JDOHelper when a custom
parcel directory or non‑default database driver was used. The script now
uses the Cloudera Manager parcel directory configuration instead of a
hard‑coded Cloudera parcel path and
automatically selects the appropriate JDBC driver based on the database
flavor.
- CDPD-73935: Fixed an issue where Ranger “federated
user” accounts could log in and perform operations
- 7.3.2
- Ranger now validates the federated user type and
prevents these external, data‑sharing users from logging in to Ranger,
ensuring they are used only for metrics, access history, and audit purposes
related to data‑sharing features.
- CDPD-73779: Support a new user type for external users
from Data Sharing
- 7.3.2
- Fixed an issue where Ranger did not distinguish users
created by the Data Catalog external user registration process from other
external users. Ranger now supports a new Federated User type in the Ranger
Admin UI to represent users originating from Data Sharing (Data Catalog), in
addition to the existing Internal and External user types.
- CDPD-71673: Security Zone policies version increment
issue
- 7.3.2
- This fix addresses an issue where updating a resource
caused the associated Security Zone policy version to increment by two
instead of one.
- CDPD-71563: Issue in
dedupTag()
method
- 7.3.2
- Fixed a logical flaw in Ranger tag de-duplication that
could incorrectly remove valid tags during the
dedupTag()
operation, preventing policy evaluation failures.
- CDPD-69631: Disable Atlas service under the policy
permission of tag-based policy
- 7.3.2
- Fixed an issue where the Ranger UI incorrectly allowed
selecting the Atlas service in tag-based policy permissions, even though
tag-based policies are not supported for Atlas. The Atlas service option is
now disabled in tag-based policy permissions to prevent
misconfiguration.
- CDPD-68970: Fixed an inconsistency between the Ranger
UI and Policy Creation API
- 7.3.2
- The Policy Creation API now validates input and fails
policy creation if the policy contains only empty values or includes
[""] or ["null"] in
policyItem users, groups, or roles, aligning API
behavior with the Ranger UI.
- CDPD-68500: Ranger policy create/update accepts
duplicate group names
- 7.3.2
- Previously, Ranger allowed duplicate group and role
entries to be added to policies when using the public policy API
(
/service/public/v2/api/policy), even though the Ranger
UI blocked such duplicates. This caused policies created or updated via the
API to contain repeated group or role names. The API has been updated to
remove duplicate user, group, and role entries during policy creation and
update, ensuring consistent behavior with the Ranger UI.
- CDPD-68297: REST endpoints do not prevent duplicate
values for a resource
- 7.3.2
- REST-based policy creation in Ranger now prevents
duplicate values for a resource. Previously, REST API calls could create
policies with duplicate resource values (for example, a database list like
[test_db1, test_db1]), which could result in multiple
policies for the same resource. Policy validation has been updated to reject
such requests and require all values for a given resource to be unique.
- CDPD-67359: Permissions issues while trying to access
folders in Hue file browser
- 7.3.2
- Fixed an issue in the Hue File Browser where accessing
S3 directories with more than 1000 objects whose names contained the “=”
character failed with a “Cannot Access: <s3 Path>” error. The S3 marker
parameter encoding has been corrected so that directories with 1000+ such
keys can now be listed successfully through RAZ.
- CDPD-67269: Support multiple resource sets in a
policy
- 7.3.2
- Improved Ranger policy evaluation to fully support
multiple resource sets within a single policy, aligning Cloudera Ranger behavior with the upstream
Apache Ranger RANGER-3796 enhancement.
- CDPD-62008: Ranger ABAC now supports internal user and
group attributes
- 7.3.2
- Resolved an issue where Ranger ABAC policies could not
leverage certain internal user and group attributes. ABAC policies can now
use the following internal attributes for access control, masking, and
row-filtering decisions:
syncSource, isInternal, and
emailAddress.
- CDPD-40734: User allowed to insert data into a hive
table when there is a deny policy on a table column
- 7.3.2
- A user is allowed to enter data into a table even if
there is a deny policy present on one of the table columns.
This
issue has been fixed now.
- OPSAPS-75602: Issue with RANGER_C719 CSD becoming
stale after upgrading Cloudera Manager
- 7.3.2
- Fixed an issue where the RANGER_C719 CSD could become
stale after upgrading Cloudera Manager from 7.13.1.600
with Cloudera 7.1.9 to 7.13.2.0 by fixing
the following:
- OPSAPS-73498: Added Cloudera Manager side ranger-trino integration
changes.
- OPSAPS-73152: Improved Ranger Admin Diagnostic collection command
from Cloudera Manager scripts.
- OPSAPS-75556: After upgrade from 7.1.9 to 7.3.2.0
dataset field type is set to boolean in solr managed-schema
- 7.3.2
- Fixed an issue where, after upgrading from Cloudera 7.1.9 to 7.3.2, the datasets field
in the ranger_audits Solr collection schema was incorrectly set to the
boolean type instead of key_lower_case with multiValued="true". This schema
mismatch caused Ranger Admin to fail to load the Access Audit page on
upgraded clusters. The upgrade process now updates the ranger_audits Solr
schema so that the datasets field is created with the correct type and
behaves consistently with fresh 7.3.2 deployments.
- OPSAPS-71619: Removed the mandatory validation for
ranger.ldap.user.dnpattern
- 7.3.2
- Previously, when LDAP was configured as the external
authentication type for Ranger Admin, the
ranger.ldap.user.dnpattern parameter was mandatory. If
it was not set, the Ranger Admin service failed to start, even though this
parameter is rarely required and is ignored when LDAP bind DN/password and
user search parameters are configured. This has been fixed by removing the
mandatory validation for ranger.ldap.user.dnpattern, so the
parameter is now optional and the service can start without requiring a
dummy value.
- OPSAPS-69156: Fixed an issue with Java
add-opens/add-modules/add-exports options
- 7.3.2
- Cloudera Manager components now
consistently use the
--add-opens=,
--add-modules=, and --add-exports=
syntax for Java options. This avoids cases where options passed via
JAVA_TOOL_OPTIONS could be rejected (for example when
using --add-opens or --add-exports without
=), improving compatibility across different Java
runtimes.
- OPSAPS-67197: Ranger RMS server shows as healthy
without service being accessible
- 7.3.2
- Previously, Cloudera Manager
reported the Ranger RMS server as healthy based only on the RMS process
(PID), even when the RMS web service was not fully initialized and the
service was inaccessible. The health check logic has been updated to use a
Cloudera Manager web alert that verifies the Ranger
RMS RMS web endpoint instead of relying solely on the PID. This allows Cloudera Manager to more accurately detect when RMS is not
accessible and helps users identify RMS availability issues faster.