Amazon Aurora PostgreSQL

Progress DataDirect for ODBC for PostgreSQL Wire Protocol Driver

An asterisk (*) indicates support that was added in a hotfix or software patch subsequent to a release.

Version 8.0.2

Certifications
  • Certified with PostgreSQL 14
    Driver version 08.02.0740 (B0921, U0675)
Enhancements
  • The default version of the OpenSSL library has been upgraded to version 1.1.1l, which fixes the following security vulnerabilities:
    • SM2 Decryption Buffer Overflow (CVE-2021-3711)
    • Read buffer overruns processing ASN.1 strings (CVE-2021-3712)

    Version 1.1.1l also addresses vulnerabilities resolved by earlier versions of the library. For more information on the installed library files, refer to the readme.
    For more information on the OpenSSL vulnerabilities resolved by this upgrade, refer to the corresponding OpenSSL announcements at https://www.openssl.org/news/vulnerabilities-1.1.1.html.

  • The driver has been enhanced to support stored procedures for PostgreSQL 11 and later.
  • The Call Escape Behavior (CallEscapeBehavior) connection option has been added to the driver. The driver determines whether to call a user-defined function or a stored procedure based on the value specified for this option.
  • The driver has been enhanced to support certificate-based authentication. It uses TLS/SSL protocol for authentication and authenticates the client to the server if the TLS/SSL client certificate is issued by a trusted Certificate Authority (CA) and the Common Name (cn) attribute of the TLS/SSL client certificate matches the database user name. Two new connection options, Client SSL Certificate and Client SSL Key, have been added to support this authentication method. Refer to the user's guide for details.
  • The Show Selectable Tables (ShowSelectableTables) connection option has been added to the driver. It determines whether the driver returns metadata for all tables or only for the tables for which the user has Select privileges. It can help the users with restricted Select privileges retrieve metadata for the required tables.
  • The driver has been enhanced to support the SCRAM-SHA-256-PLUS authentication method, which uses channel binding for establishing a secure connection with PostgreSQL (v11.0 and higher).
  • The driver has been enhanced with the new Batch Mechanism (BatchMechanism) connection option, which specifies the preferred mechanism for executing batch insert operations. By setting Batch Mechanism to 2 (MultiRowInsert) or 3 (Copy), the driver can achieve substantial performance gains when performing batch inserts. Refer to the user's guide for details. 
  • The driver has been enhanced to support the following data types: Citext, Float, and Tinyint.
  • The drivers using base version B0649 and later have been enhanced to include timestamp in the internal packet logs by default. If you want to disable the timestamp logging in packet logs, set PacketLoggingOptions=1. The internal packet logging is not enabled by default. To enable it, set EnablePacketLogging=1.
  • The Driver Manager for UNIX/Linux has been enhanced to support setting the Unicode encoding type for applications on a per connection basis. By passing a value for the SQL_ATTR_APP_UNICODE_TYPE attribute using SQLSetConnectAttr, your application can specify the encoding at connection. This allows your application to pass both UTF-8 and UTF-16 encoded strings with a single environment handle.
    The valid values for the SQL_ATTR_APP_UNICODE_TYPE attribute are SQL_DD_CP_UTF8 and SQL_DD_CP_UTF16. The default value is SQL_DD_CP_UTF8.
    This enhancement is available in build 07.16.0398 of the driver manager.
  • The new AllowedOpenSSLVersions option determines which version of the OpenSSL library file the driver uses for data encryption when multiple versions are installed with the product. For example, when specifying a value of 1.1.1 (AllowedOpenSSLVersions=1.1.1) the driver uses the 1.1.1 version of the library that is installed with the driver.
  • A Power BI connector is now included with the product package. You can use this connector to access your PostgreSQL data with Power BI. Refer to the user's guide for details.
  • The driver has been enhanced to support Select queries with parameterized arrays.
  • The driver has been enhanced to support md5 and scram-sha-256 authentication methods.
  • The driver has been enhanced to support materialized views and foreign tables.
Changed Behavior
  • For PostgreSQL 9.0 and later, the driver behavior has been updated to support executing multiple prepared statements in a single query that contain inserts for BYTEA values. However, for versions earlier than PostgreSQL 9.0, this functionality is not supported and the driver returns an error.
  • The default value for the Batch Mechanism (BatchMechanism) connection option has been changed to 3 (Copy). The driver now, by default, uses the PostgreSQL COPY command to insert rows into the target table. It allows the driver to achieve substantial performance improvements over 1 (SingleRowInsert) when performing batch inserts. Refer to the user's guide for details.
  • Support has been deprecated for HP-UX IPF and HP-UX PA-RISC platforms.
  • The following Windows platforms have reached the end of their product lifecycle and are no longer supported by the driver:
    • Windows 8.0 (versions 8.1 and higher are still supported)
    • Windows Vista (all versions)
    • Windows XP (all versions)
    • Windows Server 2003 (all versions)

Version 7.1.6

Certifications
  • Certified with PostgreSQL 13.0*
    Driver version 07.16.0426 (B0581, U0422)
  • Certified with PostgreSQL 13.0 Beta*
    Driver version 07.16.0381 (B0541, U0384)
  • Certified with SUSE Enterprise Server 15*
    Driver version 07.16.0373 (B0538, U0384)
  • Certified with Ubuntu Linux 18.04*
    Driver version 07.16.0360 (B0528, U0377)
  • Certified with PostgreSQL 12* 
    Driver version 07.16.0360 (B0528, U0377)
  • Certified with Red Hat Enterprise 8.0*
    Driver version 07.16.0340 (B0510, U0363)
  • Certified with PostgreSQL 11* 
    Driver version 07.16.0301 (B0432, U0285)
  • Certified with PostgreSQL 10.1*
    Driver version 07.16.0291 (B0404, U0264))
  • Certified with EDB Postgres Advanced Server 10.1*
    Driver version 07.16.0291 (B0404, U0264)
  • Certified with Windows Server 2019*
  • Certified with Red Hat Enterprise 7.3*
    Driver version 07.16.0280 (B0364, U0243)
  • Certified with Windows Server 2016*
    Driver version 07.16.0264 (B0332, U0218)
  • Certified with PostgreSQL 9.5*, 9.6*
    Driver version 07.16.0252 (B0304, U0205)
  • Certified with Debian Linux 7.11*, 8.5*
    Driver version 07.16.0251 (B0302, U0201)
  • Certified with Ubuntu Linux 14.04*, 16.04*
    Driver version 07.16.0251 (B0302, U0201)
  • Certified with Windows 10
  • Certified with Red Hat Enterprise 7.1
  • Certified with CentOS Linux 7.1
  • Certified with Oracle Linux 7.1
  • Certified with SUSE Enterprise Server 12
Enhancements
  • The default version of the OpenSSL library has been upgraded to version 1.1.1k, which fixes the following security vulnerabilities:*
    • CA certificate check bypass with X509_V_FLAG_X509_STRICT (CVE-2021-3450)
    • NULL pointer deref in signature_algorithms processing (CVE-2021-3449)
    • Null pointer deref in X509_issuer_and_serial_hash() (CVE-2021-23841)
    • Integer overflow in CipherUpdate (CVE-2021-23840)

    Version 1.1.1k also addresses vulnerabilities resolved by earlier versions of the library. For more information on the installed library files, refer to the readme.
    For more information on the OpenSSL vulnerabilities resolved by this upgrade, refer to the corresponding OpenSSL announcements at https://www.openssl.org/news/vulnerabilities-1.1.1.html.

  • OpenSSL library 1.1.1i has been replaced with version 1.1.1k. In addition to fixing multiple new vulnerabilities, version 1.1.1k also addresses the vulnerability resolved by version 1.1.1i: Incorrect behavior of the GENERAL_NAME_cmp function (CVE-2020-1971).*
  • OpenSSL library version 1.1.1g has been replaced with version 1.1.1k. In addition to fixing multiple new vulnerabilities, version 1.1.1k also addresses the vulnerabilities resolved by version 1.1.1k:*
    • Segmentation fault in SSL_check_chain (CVE-2020-1967)
    • rsaz_512_sqr overflow bug on x86_64 (CVE-2019-1551) 
  • OpenSSL library 1.0.2r has been replaced with version 1.0.2u. In addition to fixing multiple new vulnerabilities, version 1.0.2u also addresses the vulnerabilities resolved by version 1.0.2r.*
    Version 1.0.2u of the OpenSSL library fixes the following security vulnerabilities:
    • x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli (CVE-2019-1563)
    • Padding Oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey (CVE-2019-1563)
    • Compute ECC cofactors if not provided during EC_GROUP construction (CVE-2019-1547)
    • Installation paths in diverse Windows builds (CVE-2019-1552)

    Note: By default, the driver will attempt to load version 1.1.1 of the library; however, if the library cannot be loaded, the driver will fall back to version 1.0.2.

  • The default OpenSSL library version has been updated to 1.1.1d.*
  • The default OpenSSL library version has been updated to 1.0.2r:*
  • The default OpenSSL library version has been updated to 1.0.2n.*
  • The default OpenSSL library version has been updated to 1.0.2k.*
  • The default OpenSSL library version has been updated to 1.0.2j.*
  • The default OpenSSL library version has been updated to 1.0.2h.*
  • The default OpenSSL library version has been updated to 1.0.2g.*
  • The default OpenSSL library version has been updated to 1.0.2f.
  • Support for Kerberos Authentication.
  • The new CryptoLibName and SSLLibName connection options allow you to 
     designate the OpenSSL libraries used when SSL is enabled.

Version 7.1.5

Certifications
  • Certified with Red Hat Enterprise 7.0
  • Certified with CentOS Linux 7.0
  • Certified with Oracle Linux 7.0
  • Certified with PostgreSQL 9.3, 9.4
Enhancements
  • The OpenSSL library was upgraded to version 1.0.0r, which fixes the
    CVE‐2015‐0204 (FREAK) vulnerability. See "RSA silently downgrades
    to EXPORT_RSA [Client] (CVE‐2015‐0204)" at
    https://www.openssl.org/news/secadv_20150108.txt for more
    information.
  • The new Crypto Protocol Version connection option allows you to specify
    the cryptographic protocols used when SSL is enabled. This option can be
    used to avoid vulnerabilities associated with SSLv3 and SSLv2, including
    the POODLE vulnerability.
  • The new Unbounded Numeric Precision connection option allows you to
    define the precision for unbounded NUMERIC columns described
    within the column, parameter, result set, or table metadata.
  • The new Unbounded Numeric Scale connection option allows you to
    define the scale for unbounded NUMERIC columns described within
    the column, parameter, result set, or table metadata.

Version 7.1.4

Certifications
  • Certified with Windows 8.1
Enhancements
  • The new KeepAlive connection option allows you to use TCP Keep Alive to maintain idle TCP connections.

Version 7.1.3

Certifications
  • Certified with CentOS Linux 4.x, 5.x, and 6.x
  • Certified with Oracle Linux 4.x, 5.x, and 6.x
Changed Behavior
  • The EncryptionMethod connection option now supports Request SSL
    functionality. When Request SSL is enabled, login requests and data are
    encrypted if the server is configured for SSL. If the server is not
    configured for SSL, an unencrypted connection is established.

Version 7.1.2

Certifications
  • Certified with Oracle Solaris 11.1
  • Certified with PostgreSQL 9.2

Version 7.1.1

Certifications
  • Certified with Red Hat 6.3
  • Certified with Windows 8 and Windows Server 2012

Version 7.1.0

No changes for this release.



Connect any application to any data source anywhere

Explore all DataDirect Connectors

A product specialist will be glad to get in touch with you

Contact Us