Resolved issues

Resolved issues release notes for 26.2.x.

26.2.0-0

Updated 4/29/2026

Issue Key Application Module Description
4234407 Kubernetes

Enhanced Vertica Database Initialization for Custom Setups: Previously, coordinating initial setup tasks for Vertica databases on Kubernetes pods, such as creating users, schemas, or installing UDX libraries, was challenging. Users often resorted to complex workarounds to ensure these configurations ran only after the database was fully initialized.

Solution: We have introduced a new capability that allows you to define a custom job specification within VerticaDB. This job will automatically execute a user-defined container once the Vertica database has been successfully initialized.

Benefits: This enhancement simplifies and automates the process of performing critical post-initialization setups. Customers can now seamlessly integrate custom configurations, run Ansible scripts, or deploy C++ UDX libraries, ensuring their Vertica environment is ready for use without manual intervention or complex coordination logic.

4278598 Logging Improved Log Rotation for GCLX Profile Files: Previously, GCLX profile (.prof) files located in catalog_dir/DebugReports/ directories could accumulate indefinitely, leading to excessive disk space consumption. This update integrates these files into the existing in-server log rotation mechanism, ensuring they are properly cleaned up over time. This enhancement helps maintain system health and prevents potential customer annoyance due to unmanaged file growth.
4340995 Client Drivers - Misc

ODBC-Loader: PCRE Library Compatibility on Amazon Linux and RHEL 8.x: The ODBC-Loader previously encountered compatibility issues on Amazon Linux and Red Hat Enterprise Linux 8.x environments. This was due to a dependency on a specific build of the PCRE (Perl Compatible Regular Expressions) library, which led to runtime errors (missing symbols from libpcrecpp) when standard system-provided PCRE packages were utilized.

Resolution/Workaround: To ensure the correct functionality of the ODBC-Loader in these specific environments, a manual procedure is required. Users must perform the following steps:

  1. Remove any existing pcre-devel and pcre-cpp packages.
  2. Manually download and compile PCRE version 8.45 from its source, ensuring the use of specific compiler flags (CXXFLAGS='-std=c++11 -D_GLIBCXX_USE_CXX11_ABI=0').
  3. Update the system's dynamic linker configuration to recognize the newly installed PCRE libraries.
  4. Recompile the ODBC-Loader itself, applying the same specified CXXFLAGS used during the PCRE compilation. This detailed procedure ensures that the ODBC-Loader correctly links against a compatible PCRE build, thereby resolving the previously observed runtime issues.
4733747 Execution Engine Increased RemoteInitiatorBufSize Limit: Previously, users experienced query failures and performance issues due to an insufficient maximum limit for the RemoteInitiatorBufSize parameter, leading to "Attempted to return result set too large" errors. We have addressed this limitation by increasing the configurable maximum value for RemoteInitiatorBufSize. This enhancement allows users to set the buffer size to a sufficiently high value, preventing query failures for large result sets without negatively impacting overall query performance.
4846351 Optimizer In some cases analyze statistics could encounter internal type mismatches when processing projections causing an Optimizer assert failure. The cause of these mismatches has been resolved.
4861270 Optimizer An "Internal Optimizer Error (11)", specifically related to isInputTypeCompatibleWithExpected(intype, vartype), has been resolved. This error previously occurred during the optimization of certain complex SQL queries involving Common Table Expressions (CTEs) and UNION operations, preventing successful execution.
4892839 EON Improved run_index_tool for Communal Location Checks: The run_index_tool's CRC checker has been enhanced to more thoroughly inspect communal locations. Previously, the tool would skip unreadable files, potentially masking data corruption. With this improvement, the tool now accurately identifies and reports these unreadable files, along with their associated tables and projections. This allows customers to proactively detect corrupted data, facilitating recovery efforts and strengthening Vertica's data integrity validation mechanisms, including the--validate/-v option.
4926506 Optimizer This release includes a fix for an issue where queries in Vertica 23.4 environments would intermittently fail with an "Internal Optimizer Error (11): PlanExprFixup: No mapping found" message. This error was observed particularly after migrating table data from Vertica 8.1.1 and executing queries that functioned correctly in the previous version. This error prevented queries from completing successfully, leading to disruptions in data operations and analysis.This issue has been resolved by addressing the root cause of the optimizer error.
4937780 Execution Engine An enhancement was added in version 24.1 which preserved the outer's sortedness for hash/merge right outer joins, if it was compatible. With this ticket, we saw that it is possible in a merge join for that enhancement to result in a sort violation (which can create inconsistent results with aggregate functions, as in this case). In order to maintain the sort, we added back the explicit Sort path when we're dealing with a merge join.
4967176 UDX Java UDx JVM Sharing for Enhanced Efficiency: Previously, each session executing Java User-Defined Extensions (UDx) would instantiate its own Java Virtual Machine (JVM). This update introduces the capability for multiple user sessions to share a single Java UDx JVM. This enhancement significantly reduces memory overhead, lowers resource costs, and improves system scalability for Java UDx workloads.
5000996 Optimizer Previously, nodes could be brought down by executing a MERGE query when a target value of the INSERT statement was a subquery. Now, a proper error message is displayed when this is attempted which is in line with the restrictions for using a subquery as a value for an INSERT statement outside of a MERGE query.
5061268 Execution Engine Previously, when a user using the COPY command with the delimited parser was trying to insert data for an array[varchar] column, they could trigger an internal error if their input began with back-to-back enclosing characters. Now, the server appropriately can parse multiple enclosing characters to begin an array[varchar] column, where the first enclosing character is treated as an enclosing character and the second enclosing character represents the first character in the varchar data.
5086469 Vcluster Improved VCluster Configuration for AWS Access: This update addresses customer feedback regarding the management of AWS access information within VCluster. Previously, users were required to provide AWS access details in a separate file, which caused inconvenience. We have now streamlined this process by migrating these critical configuration parameters into config_param.json. This change simplifies VCluster setup and enhances the overall user experience by centralizing access information.
5106995 DDL - Table Previously, a scheduled stored procedure would execute with a different default value for standardConformingStrings. This would produce differing results than a stored procedure executing using the CALL functionality if the stored procedure query contained usage of backslash impacted by the setting of standardConformingStrings. Now, it is aligned with the same default value as user sessions.
5107285 Optimizer

Query Performance Degradation with Views Containing Null Columns: Fixed an issue where queries utilizing views that included additional null columns could lead to unexpected changes in the query execution plan. This often resulted in significantly higher memory consumption and 'join inner did not fit into the memory' errors, particularly impacting some standard queries.

This fix ensures more stable and optimized query execution, preventing out-of-memory issues and improving the reliability and performance of queries involving such views.

5112215 DDL - Table

This fix addresses the root cause allowing non-UTF-8 data and oversized byte strings to be stored in VARCHAR columns. The system now correctly enforces VARCHAR length constraints and ensures proper UTF-8 character handling during data insertion and processing, especially within recursive CTEs and temporary relation reuse mechanisms. This prevents the storage of invalid data and eliminates the associated query failures.

Workarounds (Prior to Fix):

Before the implementation of this fix, customers could mitigate the issue by:

  1. Disabling the EnableWITHTempRelReuseLimit session parameter.
  2. Enabling the WithClauseMaterialization session parameter. However, this option was noted to cause significant performance degradation, particularly with higher WithClauseRecursionLimit values.
5118476 Execution Engine

Excessive vertica.log Growth Leading to Node Failures: Previously, an issue was identified where vertica.log files would grow excessively large, sometimes by over 20GB in 30 minutes, due to frequent logging of [EE] <INFO> arg1, arg2, res: messages. This uncontrolled log growth consumed all available disk space in the catalog directory, leading to node failures and impacting subcluster availability.

Resolution: This fix addresses the root cause of the excessive logging. The system has been updated to prevent the frequent generation of [EE] <INFO> arg1, arg2, res: messages at an INFO level, thereby controlling the size of vertica.log files.

Impact: This resolution prevents future node failures caused by disk space exhaustion due to log growth, ensuring greater system stability and availability for Eon mode deployments running Vertica v24.3.0-1 and later.

5119497 Catalog Engine Concurrent sequence generation in OCC lock mode can now tolerateLockTimeout setting to zero. Instead of immediate failing, they now wait for the maximum amount of time given by LockTimeout and a new knob called MinOCCLockTimeout.
5130566 Data load / COPY Iceberg Manifest File Handling Improvement: Resolved an issue where Iceberg manifest Avro files, particularly those generated by DataBricks Unity Catalog, could cause application crashes when the value_counts property was present with a null value. The system now correctly processes these null values, enhancing stability and compatibility with various Iceberg data sources.
5139801, 5139802 Security This release includes important security updates to address identified critical and high-severity vulnerabilities within the vertica-23.4.0-21.x86_64.SUSE.rpm component. These updates ensure compliance with release criteria requiring zero critical and high security findings. Users are advised to upgrade to this version to benefit from enhanced security posture.
5142431 EON

Vertica Eon Mode - Corrected TEMP Data Location for Newly Added Nodes: Previously, in Vertica Eon mode clusters, when new nodes were added following a database revive operation, the DATA,TEMP storage locations on these newly provisioned nodes were incorrectly configured to point to the catalog path (e.g., /vertica_catalog) instead of the intended data path (e.g., /vertica_tmp or the specified data directory). This behavior deviated from the standard configuration observed on original nodes or nodes added to a freshly created database.

Resolution: This issue has been resolved. With this fix, all newly added nodes to an Eon mode cluster, even after a database revive, will now correctly configure their DATA,TEMP storage locations to the designated data paths, ensuring consistent and proper storage management across the cluster.

5144077 Execution Engine

This fix addresses "Insufficient resources to execute plan on pool general" errors, specifically memory exhaustion, causing transactions to fail. This issue affected queries that previously ran without problems on Vertica 10.1v, even after increasing node RAM from 500GB to 600GB. This could lead to operational disruptions and resource allocation problems within the Vertica cluster.

Resolution: This fix resolves the memory resource allocation inefficiencies and errors, enabling successful query execution within configured resource limits.

5158893 EON

Catalog Truncation for Compressed Transaction Logs Issue: Previously, when catalog truncation was performed on compressed transaction log files, an incorrect counter was used to determine the log size. This led to the transaction log file being truncated more than necessary, resulting in corruption and subsequent startup failures.

Resolution: The system now correctly identifies and uses the appropriate counter to determine the size of compressed transaction log files during truncation. This ensures that the last transaction file is truncated accurately, preventing corruption and ensuring successful restarts.

5162622 Security

Fix for FAILED_LOGIN_ATTEMPTS Profile Parameter: Previously, the FAILED_LOGIN_ATTEMPTS profile parameter in Vertica did not function as expected. When a user profile was configured with a specific limit for failed login attempts (e.g., 5 attempts), the user account would unexpectedly lock after a fewer number of failed attempts (e.g., 3 attempts). This discrepancy led to premature account lockouts, causing inconvenience for end-users and impacting business operations. This behavior was specifically observed and reproduced in Vertica Analytic Database v25.1.0-0.

Resolution: This issue has been resolved. The FAILED_LOGIN_ATTEMPTS profile parameter now correctly enforces the configured number of failed login attempts before locking a user account. Users will no longer experience premature account lockouts due to this parameter, ensuring that security policies are applied as intended.

5162699 Installation Program

--ssh-password Option Failure in install_vertica and update_vertica: Previously, the --ssh-password option in the install_vertica and update_vertica scripts was not being correctly applied. This led to the scripts prompting for an SSH password and becoming unresponsive during installation or upgrade processes, especially in environments where passwordless SSH was not configured. This behavior resulted in incomplete upgrades and operational disruptions.

Resolution: The --ssh-password option is now properly recognized. The install_vertica and update_vertica scripts now correctly utilize the provided SSH password, ensuring smooth and uninterrupted execution without unexpected password prompts.

5163573 S3

S3 Streaming Connection Management Improvement: Previously, the S3 layer could improperly count streaming connections, potentially leading to connection pool exhaustion during surges of S3 requests. This issue could block S3 reads, including critical operations like TxnLogSync, and impact query performance.

This release includes an improvement to ensure streaming connections are counted atomically and managed correctly, preventing connection pool exhaustion and ensuring reliable S3 read operations, even under high load.

5174220 Kafka Integration Core Vulnerability (CVE-2025-68161): This update addresses a critical security vulnerability, CVE-2025-68161, found in org.apache.logging.log4j_log4j-core version 2.17.1. The vulnerability was identified during Prisma scans on container_minimal_arm environments. The Log4j core library has been upgraded to version 2.25.3 to mitigate this issue.
5182302 Admin Tools Before this release, AdminTools restart_node may find a secondary UP node to run catalog editor for getting catalog information. After this fix, AdminTools restart_node consistently finds a primary UP node to run catalog editor for getting catalog information. This ensures you're getting the correct and up-to-date catalog information.
5195379 Security Vertica TLS Key File Path Recognition: An issue has been resolved where Vertica version 25.1.0-3 incorrectly recognized the TLS key file location as "/.vsql/" instead of the expected "/home/vertica/.vsql/". This prevented successful TLS connections, particularly for customers upgrading from version 24.4.0-1. The fix ensures that Vertica now correctly identifies the TLS key file path, allowing for proper TLS connectivity.
5195776 Client Drivers - ODBC Vertica ODBC Driver Performance Restoration for Data Unloads: This fix addresses a significant performance degradation observed in newer Vertica ODBC drivers (versions 23.04.0000 and 25.01.0005). Previously, customers utilizing SAS software for data transformations and reporting experienced a 10-20% reduction in unload performance when migrating from older driver versions (e.g., 11.00.0200). This update ensures that data unload operations now perform at expected speeds, restoring efficiency for users.
5196319 EON A new internal knob called RemoveBadRestorePointsOnStartup is added to allow progress of startup in the presence of bad restore points, if enabled.
5206178 Node Management Agent

Security Fix: Golang Vulnerabilities in Vertica Binaries: This release addresses multiple security vulnerabilities found in Golang binaries shipped with Vertica 26.1.0-0. These vulnerabilities, including several critical and high-severity CVEs, affected core Vertica components and could prevent deployment in Kubernetes environments with strict vulnerability-based admission controllers.

Key Vulnerabilities Addressed:

  • CVE-2024-45337 (CRITICAL): Authorization bypass in golang.org/x/crypto/ssh.
  • CVE-2025-68121 (CRITICAL/UNKNOWN): Session resumption issue in crypto/tls.
  • CVE-2025-22869 (HIGH): Denial of Service in golang.org/x/crypto/ssh.
  • CVE-2025-61726 (HIGH): Memory exhaustion in net/url query parameter parsing. Resolution: The fix involves updating vulnerable Golang dependencies, specifically golang.org/x/crypto to v0.45.0, golang.org/x/net to v0.47.0, and github.com/go-viper/mapstructure/v2 to v2.4.0. Additionally, the Go compiler has been upgraded to version 1.24.13 to resolve stdlib vulnerabilities. This update significantly enhances the security posture of Vertica container images.

Affected Components:

  • opt/vertica/bin/vcluster
  • opt/vertica/bin/vcluster_server
  • opt/vertica/bin/vertica-client-proxy
  • opt/vertica/bin/vertica_mcp_server
  • opt/vertica/bin/node_management_agent
5206299 Execution Engine Database Crash with ~ ANY (Subquery): Fixed a critical issue that caused the Vertica database to crash unexpectedly with a SIGSEGV error when processing queries containing the ~ ANY (Subquery) construct. This fix improves database stability and prevents service unavailability.
5208747 Kubernetes, Vcluster

Before the fix, the Kubernetes operator may error out upon seeing remote user storage location when reviving an Eon database migrated from 10.x Enterprise database.

With the fix, the Kubernetes operator correctly handles the remote user storage locations created in old version enterprise database for reviving.

5222928 Security Enhanced Security: ECC Support for SSL Certificates: Vertica now supports Elliptic Curve Cryptography (ECC) for SSL certificates, offering a more modern and robust alternative to the traditional RSA algorithm. This enhancement significantly strengthens Vertica's SSL/TLS security posture, aligning with contemporary security best practices and providing a more secure communication environment.
5224783 Backup/DR

Performance Improvement for Snapshot Loading: This release addresses a performance bottleneck observed during the load_snapshot() operation, which could sometimes take up to 4 hours on certain nodes.

Key Improvements:

  • Optimized Storage Container Checks: Reduced redundant checks for storage locations within Storage Containers (SCs).
  • Streamlined CRC Verification: Introduced optimizations to skip unnecessary CRC checks for existing storage bundles. These enhancements significantly improve the efficiency and reduce the duration of the load_snapshot() process, leading to faster system recovery and improved overall performance.
5225942 Complex Types

View Creation with UNNEST and CASE Expressions: Previously, users encountered an ERROR 3457: Function unnest(-) does not exist when attempting to create a view that utilized the unnest function within a CASE expression. This specific issue manifested when the CASE expression involved NULL arrays of complex types, such as ARRAY[ROW(...)] or ARRAY[ARRAY[...]].

Resolution: This release includes a fix that resolves the type resolution issue for unnest functions within CASE expressions during view creation. Users can now successfully define views containing unnest with CASE expressions, even when handling NULL arrays of complex types, without encountering the aforementioned error.

5254733 Admin Tools Critical and High Security Vulnerabilities Addressed: This release includes important security updates to address several critical and high-severity vulnerabilities (CVEs) identified in version 23.4.0-23. These fixes enhance the overall security and stability of the system.
5270913 Data load / COPY FCSVPARSER used to incorrectly parse CRLF record terminators leading in some cases to reject the data value of the last field in the record. Now, CRLF record terminators are properly parsed.
5280338 Optimizer Overly restrictive error handling was added for complex/nested complex types containing user-defined functions. This was causing some valid SQL to report an 'unsupported' error when it should not have. This issue has been fixed.
5293124 Kubernetes

Security Update: verticadb-operator: This release includes an important security fix for verticadb-operator:26.1.2-0.

Resolved Issue:

  • CVE-2026-33186: Addressed a critical security vulnerability in the gRPC component, which required an upgrade to a patched version. This update enhances the security posture of the operator.
5297569 Kubernetes

Scrutinize System Tables Collection on Kubernetes: This release addresses an issue where running Scrutinize using a Custom Resource Definition (CRD) on Kubernetes, specifically in prod and dev EON environments, failed to collect system tables. Previously, the generated Scrutinize tarball did not include these critical system tables, impacting diagnostic capabilities.

With this fix, Scrutinize tarballs generated via CRD on Kubernetes will now correctly include all expected system tables, ensuring comprehensive data collection for troubleshooting and analysis.

5326993 Client Drivers - ODBC, Client Drivers - VSQL

Vertica 26.x Client Driver SSL Connectivity Fix Issue Addressed: This release resolves a critical defect affecting Vertica 26.1.0-3 client drivers (ODBC and vsql). Previously, these drivers failed to establish connections to Vertica servers with SSL enabled. Users experienced issues such as the ODBC test connection screen disappearing without a message and vsql exiting without an error, blocking customer operations. This behavior was specific to Vertica 26.x drivers, while Vertica 25.x drivers functioned correctly under the same conditions.

Resolution: This fix ensures that Vertica 26.x client drivers now correctly connect to SSL-enabled Vertica servers, restoring stable and secure connectivity and aligning with the expected behavior observed in previous driver versions.

5329625 Backup/DR Tombstone objects can have empty locations if queued after an upgrade from version 23.4 and older. For these, we now use the default storage location to avoid possible SIGSEGV.
5330533 Client Drivers - JDBC Vertica JDBC Hang on Upgraded Clusters: Resolved a critical issue where Vertica JDBC clients would intermittently hang or queries would fail with cancellation errors (SQL State 57014) on upgraded Vertica clusters (from 12.0.4-11 to 25.1 or 25.4). This problem primarily affected non-dbadmin users and, in some instances, all users on fresh Vertica 25.x installations, causing indefinite client hangs despite successful query execution on the server side.
5332431 UI - Management Console Vertica MC Server: Login Session Stability Improvement: An issue has been fixed where users upgrading to version 26.1.0-3 of the Vertica Management Console experienced "key clock application session has expired" errors, preventing successful login. This fix ensures stable user sessions post-upgrade.