AVEVA Adapter for RDBMS Module 1.1 release notes
- Last UpdatedNov 04, 2025
- 3 minute read
- PI System
- Adapter for RDBMS 1.1
- Adapters
AVEVA Adapter for RDBMS Module: 1.1
AVEVA Adapter for RDBMS: 1.1.0.337
Adapter Framework: 1.8.3.128
Edge Module Manager: 1.2.0.81
Alpine Linux: 3.20.6
AVEVA Adapter for RDBMS, released November 2025, is a containerized version of the adapter that can be deployed using Edge Management on CONNECT. It offers most of the capabilities as the adapter that is available for installation directly on the device.
For more information on product features and functions, refer to the following sections:
-
Prerequisites and system requirements
-
Installation/uninstallation instructions
refer to AVEVA Adapter for RDBMS.
The latest information about the 1.1 release is available online on the AVEVA Documentation Portal.
New features and enhancements
The following items were added in this release:
-
Support for processing client-side failover and server-side failover .
-
Support for Unit of Measurement (UoM) discovery in Discovery Queries.
-
Improvements to discovery queries to support valueColumns, enabling Unit of Measure in discovery.
-
WiX Toolset upgraded to version 5 for Windows Installer.
Resolved issues
This section lists items that were resolved in this release:
|
Work Items |
Description |
|---|---|
|
3076716 |
Container messages are not sent in history recovery. |
|
3083201 |
Data Collection may not start or may be delayed in time zones with a positive UTC offset. |
|
3086208 |
Device Status is incorrect when posting an invalid connection string after a valid one. |
|
3103696 |
Discovery is not performed as impersonated user credentials. |
|
3359574 |
KeyNotFoundException displayed when running scheduleId with multiple queries. |
|
3814015 |
On-Demand history recovery incorrectly interprets the endtime, resulting in a larger interval than expected. |
|
3814039 |
The RequestInterval endtime is used for the final interval ?ET? query parameter rather than the history recovery endtime. |
Known issues
There are no known issues for this release.
Security information and guidance
We are committed to releasing secure products. This section is intended to provide relevant security-related information to guide your installation or upgrade decision.
We proactively disclose aggregate information about the number and severity of security vulnerabilities addressed in each release. The tables below provide an overview of security issues addressed and their relative severity based on standard scoring.
Overview of new vulnerabilities - Fixed or Mitigated
This section is intended to provide relevant security-related information to guide your installation or upgrade decision. AVEVA is proactively disclosing aggregate information about the number and severity of AVEVA Adapter for RDBMS security vulnerabilities that are fixed in this release.
For this release of AVEVA Adapter for RDBMS, the following vulnerabilities have been fixed or mitigated.
Security vulnerabilities fixed in AVEVA Adapter for RDBMS 1.1 release
|
Severity Category |
CVSS Base Score Range |
Number of Fixed Vulnerabilities |
|---|---|---|
|
Critical |
9 - 10 |
0 |
|
High |
7.0 - 8.9 |
0 |
|
Medium |
4.0 - 6.9 |
0 |
|
Low |
0 - 3.9 |
0 |
Vulnerability mitigations in AVEVA Adapter for RDBMS 1.1 release
|
Component |
Version |
CVE or Reference |
CVSS |
Mitigation |
|---|---|---|---|---|
|
BusyBox |
1.36.1 |
8.8 |
Vulnerable code is not in execution path. |
|
|
BusyBox |
1.36.1 |
7.8 |
Vulnerable code is not in execution path. |
|
|
BusyBox |
1.36.1 |
3.3 |
Vulnerable code is not in execution path. |
|
|
BusyBox |
1.36.1 |
2.2 |
Vulnerable code is not in execution path. |
|
|
dotnet/runtime |
8.0.11 |
8.8 |
Vulnerable code is not in execution path. |
|
|
dotnet/runtime |
8.0.11 |
7.5 |
Vulnerable code is not in execution path. |
|
|
dotnet/runtime |
8.0.11 |
6.5 |
Vulnerable code is not in execution path. |
|
|
ICU for C/C++ (ICU4C) |
74.2 |
6.1 |
Vulnerable code is not in execution path. |
|
|
musl |
1.2.5 |
7.1 |
Vulnerable code is not present. |
|
|
OpenSSL |
3.3.3 |
7.1 |
Vulnerable code is not in execution path. |
|
|
OpenSSL |
3.3.3 |
5.7 |
Vulnerable code is not in execution path. |
|
|
OpenSSL |
3.3.3 |
5.2 |
Vulnerable code is not in execution path. |
|
|
OpenSSL |
3.3.3 |
4.0 |
Vulnerable code is not in execution path. |