Progress DataDirect for ODBC for Oracle Wire Protocol Driver
An asterisk (*) indicates support that was added in a hotfix or software patch subsequent to a release.
- Certified with SUSE Enterprise Server 15*
Driver version 08.02.2328 (B0610, U0430)
- Certified with Ubuntu Linux 18.04*
Driver version 08.02.2305 (B0580, U0410)
- Certified with Red Hat Enterprise 8.0*
Driver version 08.02.2272 (B0547, U0390)
- Oracle Autonomous Data Warehouse Cloud 12c R2 (12.2)*
Driver version 08.02.2099 (B0294, U0194)
- Red Hat Enterprise 7.3
Driver version 08.01.2073 (B0259, U0174)
- Windows Server 2016 Driver version 08.01.2047 (B0226, U0145)
- Support for the following platforms is now generally available:
- HP-UX IPF (32 and 64-bit)
- HP-UX PA-RISC (32-bit)
- Oracle Solaris x86 (32- and 64-bit)
- Oracle Solaris on SPARC (32- and 64-bit)
- Support for the Intel Itanium II (IPF) processor on the following 64-bit Linux platforms is now generally available:
- CentOS Linux
- Oracle Linux
- Red Hat Enterprise Linux
- The default version of the OpenSSL library has been upgraded to version 1.1.1i, which fixes the following security vulnerability: Incorrect behavior of the GENERAL_NAME_cmp function (CVE-2020-1971).*
Version 1.1.1i also addresses vulnerabilities resolved by earlier versions of the library. For more information on the installed library files, refer to the readme.
For more information on the OpenSSL vulnerabilities resolved by this upgrade,
refer to the corresponding OpenSSL announcements at
- The driver has been enhanced to support extended connection failover for the connections established using the TNSNAMES.ORA file. Refer to the user's guide for details.*
- OpenSSL library 1.1.1g has been replaced with version 1.1.1i. In addition to fixing multiple new vulnerabilities, version 1.1.1i also addresses the vulnerabilities resolved by version 1.1.1g:*
- Segmentation fault in SSL_check_chain (CVE-2020-1967)
- rsaz_512_sqr overflow bug on x86_64 (CVE-2019-1551)
- The drivers using base version B0649 and later have been enhanced to include timestamp in the internal packet logs by default. If you want to disable the timestamp logging in packet logs, set PacketLoggingOptions=1. The internal packet logging is not enabled by default. To enable it, set EnablePacketLogging=1.*
- OpenSSL library 1.0.2r has been replaced with version 1.0.2u. In addition
to fixing multiple new vulnerabilities, version 1.0.2u also addresses the
vulnerabilities resolved by version 1.0.2r.*
Version 1.0.2u of the OpenSSL library fixes the following security vulnerabilities:
- x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli (CVE-2019-1563)
- Padding Oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey (CVE-2019-1563)
- Compute ECC cofactors if not provided during EC_GROUP construction (CVE-2019-1547)
- Installation paths in diverse Windows builds (CVE-2019-1552)
Note: By default, the driver will attempt to load version 1.1.1 of the library; however, if the library cannot be loaded, the driver will fall back to version 1.0.2.
- The driver has been enhanced to support Oracle Wallet Password Stores. When
this feature is enabled, the driver retrieves database credentials from an
Oracle Wallet to be used for authentication to the server. The driver has also
been enhanced with the new Credentials Wallet Entry (CredentialsWalletEntry),
Credentials Wallet Path (CredentialsWalletPath), Wallet Password
(CredentialsWalletPassword) options, which are used to configure this feature.
Note: Oracle Wallet Password Store functionality requires the OpenSSL 1.1.1
library. Earlier versions of the library, including those installed with
the driver, are not supported by the feature.
- The driver has been enhanced to support connecting using the connection information stored in
an LDAP entry. You can configure the driver to use
LDAP with the new LDAP Distinguished Name (LDAPDistinguishedName) option and
refreshed Host (HostName) and Port Number (PortNumber) options.
- The Driver Manager for UNIX/Linux has been enhanced to support setting the
Unicode encoding type for applications on a per connection basis. By passing
a value for the SQL_ATTR_APP_UNICODE_TYPE attribute using SQLSetConnectAttr,
your application can specify the encoding at connection. This allows your
application to pass both UTF-8 and UTF-16 encoded strings with a single
The valid values for the SQL_ATTR_APP_UNICODE_TYPE attribute are
SQL_DD_CP_UTF8 and SQL_DD_CP_UTF16. The default value is SQL_DD_CP_UTF8.
This enhancement is available in build 08.02.0449 of the driver manager.
- The curl library files that are installed with the product have been
upgraded to version 7.66.0, which fixes a number of potential security
vulnerabilities. For more information on the vulnerabilities resolved
by this enhancement, refer to: https://curl.haxx.se/docs/vulnerabilities.html.
This upgrade is available starting in build 08.02.0116 of the curl library
- The driver has been enhanced to support connecting through Oracle Connection
Manager using the TNSNAMES.ORA file.*
- The default OpenSSL library version has been updated to 1.1.1d.*
- The new AllowedOpenSSLVersions option determines which version of the OpenSSL library file the driver uses for data
encryption when multiple versions are installed with the product. For example,
when specifying a value of 1.1.1 (AllowedOpenSSLVersions=1.1.1) the driver uses the 1.1.1 version of the library that is installed with the driver.*
- The default version of the OpenSSL library has been updated to 1.0.2r.*
- The driver has been enhanced to support connecting to a proxy server through
an HTTP connection. HTTP proxy support is configurable with the new Proxy Host,
Proxy Mode, Proxy Password, Proxy Port, and Proxy User connection options.*
Note: The driver does not currently support SSL data encryption for HTTP proxy connections.
The driver has been enhanced with the new Impersonate User connection option
that allows you to specify the proxy user ID used for impersonation. The user
ID specified using this option determines your permissions and identity when
- The driver has been enhanced to support using the default Service Name or SID
specified in the server-side listener.ora file.*
- The setting of the Array Size option can now be overridden by specifying the
number of rows to fetch using the SQL_ATTR_ROW_ARRAY_SIZE statement attribute.*
Support for Oracle Wallet, including:
- Oracle Wallet SSL Authentication
- Using Oracle Wallet as a keystore or truststore for SSL data encryption.
- The driver has been certified to use Oracle Internet Directory as a means to store authentication information.
- The Oracle driver has been enhanced to support the following new data integrity algorithms for Oracle 12c and higher: SHA256, SHA384, SHA512. To use these algorithms, specify their values using the Data Integrity Types connection option and enable data integrity checks with the Data Integrity Level connection option.
- The maximum supported length of identifiers has been increased to 128 bytes when connecting to Oracle 12c R2 (12.2) databases. This change has been implemented to reflect the new maximum length supported by the server.
The following Windows platforms have reached the end of their product lifecycle
and are no longer supported by the driver*:
- Windows 8.0 (versions 8.1 and higher are still supported)
- Windows Vista (all versions)
- Windows XP (all versions)
- Windows Server 2003 (all versions)
The default value for the Data Integrity Types connection option has changed to the following: MD5,SHA1,SHA256,SHA384,SHA512.
- Debian Linux 7.11, 8.5 (driver version 07.15.0159 (B0270, U0182))
- Ubuntu Linux 14.04, 16.04 (driver version 07.15.0159 (B0270, U0182))
The default OpenSSL library has been updated to version 1.0.2n.*
- The default OpenSSL library has been updated to version 1.0.2k.*
- Support for the Oracle 12 and 12a authentication protocols, which provide improved security.
- Support for returning implicit result sets from stored procedures.
- The driver is now compiled using Visual Studio 2015 for improved security.
- The new SDU Size connection option allows you to specify the size in bytes of the Session Data Unit (SDU) that the driver requests when connecting to the server.
- The new Support Binary XML connection option enables the driver to support XMLType with binary storage on servers running Oracle 12c and higher.
- The new LOB Prefetch Size connection option allows you to specify the size of prefetch data the driver returns for BLOBs and CLOBs for Oracle database versions 126.96.36.199 and higher. With LOB prefetch enabled, the driver can return LOB meta-data and the beginning of LOB data along with the LOB locator during a fetch operation. This can have significant performance impact, especially for small LOBs which can potentially be entirely prefetched, because the data is available without having to go through the LOB protocol.
The Enable N-CHAR Support connection option has been deprecated, and the driver behavior has been updated to always provide support for the N-types NCHAR, NVARCHAR2 and NCLOB. For compatibility purposes, the EnableNcharSupport attribute can still be manually specified for this release, but will be deprecated in subsequent versions of the product.
- The Enable Timestamp with Timezone connection option has been deprecated, and the driver behavior has been updated to always expose timestamps with timezones to the application. For compatibility purposes, the EnableTimestampwithTimezone attribute can still be manually specified for this release, but it will be deprecated in subsequent versions of the product.
- The default value for the Data Integrity Level connection option has been updated to 1 (Accepted). By default, a data integrity check can now be made on data sent between the driver and the database server, if the server request or requires it. This change allows the driver to connect to servers requiring Oracle Advanced Security data integrity checks using the default configuration.
- The default value for the Encryption Level connection option has been updated to
1 (Accepted). By default, encryption is now used on data sent between the driver and the database server if the database server requests or requires it. This change allows the driver to connect to servers requiring Oracle Advanced Security encryption using the default configuration.
- Certified with Debian Linux 7.11*, 8.5* (driver version 07.15.0159 (B0270, U0182))
- Certified with Ubuntu Linux 14.04*, 16.04* (driver version 07.15.0159 (B0270, U0182))
- Certified with Windows 10
- Certified with Red Hat Enterprise 7.1
- Certified with CentOS Linux 7.1
- Certified with Oracle Linux 7.1
- Certified with SUSE Enterprise Server 12
- The default OpenSSL library version has been updated to 1.0.2j.*
- The default OpenSSL library version has been updated to 1.0.2h.*
- The default OpenSSL library version has been updated to 1.0.2g.*
- The default OpenSSL library version has been updated to 1.0.2f.
- The new CryptoLibName and SSLLibName connection options allow you to
designate the OpenSSL libraries used when SSL is enabled.
- Certified with Red Hat Enterprise 7.0
- Certified with CentOS Linux 7.0
- Certified with Oracle Linux 7.0
- The OpenSSL library was upgraded to version 1.0.0r, which fixes the
CVE‐2015‐0204 (FREAK) vulnerability. See "RSA silently downgrades
to EXPORT_RSA [Client] (CVE‐2015‐0204)" at
https://www.openssl.org/news/secadv_20150108.txt for more
- The new PRNGSeedSource connection option allows you to specifies whether the
driver uses a file or the RAND_poll function as the seed source for SSL key generation.
- The new PRNGSeedFile connection option allows you to specify the entropy‐source file or device used as a seed for SSL key generation.
- The new Crypto Protocol Version connection option allows you to specify the cryptographic protocols used when SSL is enabled. This option can be used to avoid vulnerabilities associated with SSLv3 and SSLv2, including the POODLE vulnerability.
- Certified with Windows 8.1
The new KeepAlive connection option allows you to
use TCP Keep Alive to maintain idle TCP connections.
- Certified with CentOS Linux 4.x, 5.x, and 6.x
- Certified with Oracle Linux 4.x, 5.x, and 6.x
- Certified with Oracle 12c
Modified to support all Oracle 11gR2 Kerberos encryption algorithms.
- Certified with Oracle Solaris 11.1
- Certified with Red Hat 6.3
- Certified with Windows 8 and Windows Server 2012
- Support for Oracle Advanced Security (OAS).