Oracle Database

Progress DataDirect for ODBC for Oracle Wire Protocol Driver

An asterisk (*) indicates support that was added in a hotfix or software patch subsequent to a release.

Version 8.0.1

Certifications
  • Certified with Red Hat Enterprise 7.3* (driver version 08.01.2073 (B0259, U0174))
  • Certified with Oracle 12c R2* (12.2) (driver version 008.01.2067 (B0252, U0168))
  • Certified with Windows Server 2016* (driver version 08.01.2047 (B0226, U0145))
  • Debian Linux 7.11, 8.5 (driver version 07.15.0159 (B0270, U0182))
  • Ubuntu Linux 14.04, 16.04 (driver version 07.15.0159 (B0270, U0182))
  • macOS  v10.12.x (Sierra)  (driver version 08.01.1068 (B0000, U1068))
Enhancements
  • The driver has been updated with OpenSSL library version 1.0.2k, which addresses the following security vulnerabilities:*
    • Truncated packet could crash via OOB read (CVE-2017-3731)
    • BN_mod_exp may produce incorrect results on x86_64 (CVE-2017-3732)
    • Montgomery multiplication may produce incorrect results (CVE-2016-7055)

    Version 1.0.2k also addresses the following vulnerabilities resolved by earlier versions of the library:

    • "Missing CRL sanity check" (CVE-2016-7052)
    • "OCSP Status Request extension unbounded memory growth" (CVE-2016-6304)
    • "SWEET32 Mitigation" (CVE-2016-2183)
    • "OOB write in MDC2_Update()" (CVE-2016-6303)
    • "Malformed SHA512 ticket DoS" (CVE-2016-6302)
    • "OOB write in BN_bn2dec()" (CVE-2016-2182)
    • "OOB read in TS_OBJ_print_bio()" (CVE-2016-2180)
    • "Pointer arithmetic undefined behaviour" (CVE-2016-2177)
    • "Constant time flag not preserved in DSA signing" (CVE-2016-2178)
    • "DTLS buffered message DoS" (CVE-2016-2179)
    • "DTLS replay protection DoS" (CVE-2016-2181)
    • "Certificate message OOB reads" (CVE-2016-6306)
    • "Padding oracle in AES-NI CBC MAC check" (CVE-2016-2107)
    • "EVP_EncodeUpdate overflow" (CVE-2016-2105)
    • "EVP_EncryptUpdate overflow" (CVE-2016-2106)
    • "ASN.1 BIO excessive memory allocation" (CVE-2016-2109)
    • "EBCDIC overread" (CVE-2016-2176)
    • "missing Memory allocation success checks in doapr_outch function in
      crypto/bio/b_print.c" (CVE‐2016‐2842)
    • "Cross‐protocol attack on TLS using SSLv2 (DROWN)" (CVE‐2016‐0800)
    • "memory issues in BIO_*printf functions" (CVE‐2016‐0799)
    • "Memory leak in SRP database lookups" (CVE‐2016‐0798)
    • "Double‐free in DSA code" (CVE‐2016‐0705)
    • "Side channel attack on modular exponentiation" (CVE-2016-0702)
    • Provides stronger cryptographic assurance against the "Logjam" vulnerability (CVE‐2015‐4000)
    • "DH small subgroups" (CVE‐2016‐0701)
    • "SSLv2 doesn't block disabled ciphers" (CVE‐2015‐3197)
    • "BN_mod_exp may produce incorrect results on x86_64" (CVE‐2015‐3193)
    • "Certificate verify crash with missing PSS parameter"(CVE‐2015‐3194)
    • "X509_ATTRIBUTE memory leak" (CVE‐2015‐3195)
    For more information on the OpenSSL vulnerabilities resolved by this upgrade, refer to the corresponding OpenSSL announcements at https://www.openssl.org/news/openssl-1.0.2-notes.html.
  • Support for the Oracle 12 and 12a authentication protocols, which provide improved security.
  • Support for returning implicit result sets from stored procedures.
  • The driver is now compiled using Visual Studio 2015 for improved security.
  • The new SDU Size connection option allows you to specify the size in bytes of the Session Data Unit (SDU) that the driver requests when connecting to the server.
  • The new Support Binary XML connection option enables the driver to support XMLType with binary storage on servers running Oracle 12c and higher. 
  • The new LOB Prefetch Size connection option allows you to specify the size of prefetch data the driver returns for BLOBs and CLOBs for Oracle database versions 12.1.0.1 and higher. With LOB prefetch enabled, the driver can return LOB meta-data and the beginning of LOB data along with the LOB locator during a fetch operation. This can have significant performance impact, especially for small LOBs which can potentially be entirely prefetched, because the data is available without having to go through the LOB protocol.
Changed Behavior 
  • Support for the following platforms has been deprecated:
    • HP-UX IPF (32 and 64-bit)
    • HP-UX PA-RISC (32-bit) 
    • Oracle Solaris x86 (32- and 64-bit)
    • Oracle Solaris on SPARC (32- and 64-bit)
  • The Enable N-CHAR Support connection option has been deprecated, and the driver behavior has been updated to always provide support for the N-types NCHAR, NVARCHAR2 and NCLOB. For compatibility purposes, the EnableNcharSupport attribute can still be manually specified for this release, but will be deprecated in subsequent versions of the product. 
  • The Enable Timestamp with Timezone connection option has been deprecated, and the driver behavior has been updated to always expose timestamps with timezones to the application. For compatibility purposes, the EnableTimestampwithTimezone attribute can still be manually specified for this release, but it will be deprecated in subsequent versions of the product.
  • The default value for the Data Integrity Level connection option has been updated to 1 (Accepted). By default, a data integrity check can now be made on data sent between the driver and the database server, if the server request or requires it. This change allows the driver to connect to servers requiring Oracle Advanced Security data integrity checks using the default configuration.
  • The default value for the Encryption Level connection option has been updated to 1 (Accepted). By default, encryption is now used on data sent between the driver and the database server if the database server requests or requires it. This change allows the driver to connect to servers requiring Oracle Advanced Security encryption using the default configuration. 

Version 8.0.0

New Progress DataDirect for ODBC for Oracle Wire Protocol Driver on macOS Platforms
  • Platform Certifications
    • Mac OS X v10.11.x (El Capitan) 
    • Mac OS X v10.10.x (Yosemite) 
    • Mac OS X v10.9.x (Mavericks)
  • Database Certifications
    • Oracle 12c R1 (12.1)
    • Oracle 11g R1, R2 (11.1, 11.2)
    • Oracle 10g R1, R2 (10.1, 10.2)
    • Oracle9i R2 (9.2)
    • Oracle8i R3 (8.1.7)
  • Enhancements:
    • The default OpenSSL library version has been updated to 1.0.2j.

  • Features
    • Support for iODBC Driver Manager, version 3.52.7 and higher
    • The driver supports all ODBC Core and most Level 1 functions.
    • The driver supports the core SQL 92 grammar.
    • The driver supports advanced security features, including SSL data encryption and Kerberos authentication.
    • The driver supports failover.
    • The driver supports the storage of client information.

Note: The 8.0 version of the Oracle Wire Protocol driver currently supports only Mac OS X platforms. Windows and UNIX/Linux versions are available as part of the 7.1.6 versions of the DataDirect Connect and Connect64 products.

Version 7.1.6

Certifications
  • Certified with Debian Linux 7.11*, 8.5* (driver version 07.15.0159 (B0270, U0182))
  • Certified with Ubuntu Linux 14.04*, 16.04* (driver version 07.15.0159 (B0270, U0182))
  • Certified with Windows 10
  • Certified with Red Hat Enterprise 7.1
  • Certified with CentOS Linux 7.1
  • Certified with Oracle Linux 7.1
  • Certified with SUSE Enterprise Server 12
Enhancements
  • The default OpenSSL library version has been updated to 1.0.2j.*
  • The default OpenSSL library version has been updated to 1.0.2h.*
  • The default OpenSSL library version has been updated to 1.0.2g.*
  • The default OpenSSL library version has been updated to 1.0.2f.
  • The new CryptoLibName and SSLLibName connection options allow you to 
     designate the OpenSSL libraries used when SSL is enabled.

Version 7.1.5

Certifications
  • Certified with Red Hat Enterprise 7.0
  • Certified with CentOS Linux 7.0
  • Certified with Oracle Linux 7.0
Enhancements
  • The OpenSSL library was upgraded to version 1.0.0r, which fixes the
    CVE‐2015‐0204 (FREAK) vulnerability. See "RSA silently downgrades
    to EXPORT_RSA [Client] (CVE‐2015‐0204)" at
    https://www.openssl.org/news/secadv_20150108.txt for more
    information.
  • The new PRNGSeedSource connection option allows you to specifies whether the
    driver uses a file or the RAND_poll function as the seed source for SSL key generation.
  • The new PRNGSeedFile connection option allows you to specify the entropy‐source file or device used as a seed for SSL key generation.
  • The new Crypto Protocol Version connection option allows you to specify the cryptographic protocols used when SSL is enabled. This option can be used to avoid vulnerabilities associated with SSLv3 and SSLv2, including the POODLE vulnerability.

Version 7.1.4

Certifications
  • Certified with Windows 8.1
Enhancements
  • The new KeepAlive connection option allows you to use TCP Keep Alive to maintain idle TCP connections.

Version 7.1.3

Certifications
  • Certified with CentOS Linux 4.x, 5.x, and 6.x
  • Certified with Oracle Linux 4.x, 5.x, and 6.x
  • Certified with Oracle 12c
Enhancements
  • Modified to support all Oracle 11gR2 Kerberos encryption algorithms.

Version 7.1.2

Certifications
  • Certified with Oracle Solaris 11.1

Version 7.1.1

Certifications
  • Certified with Red Hat 6.3
  • Certified with Windows 8 and Windows Server 2012

Version 7.1.0

Driver Enhancements
  • Support for Oracle Advanced Security (OAS).

Progress DataDirect Connect and Connect64 Oracle Driver

Version 7.1.6

Certifications
  • Certified with Red Hat Enterprise 7.3* (driver version 07.16.0161 (B0365, U0243))
  • Certified with Debian Linux 7.11*, 8.5* (driver version 07.16.0276 (B0312, U0207))
  • Certified with Ubuntu Linux 14.04*, 16.04* (driver version 07.16.0276 (B0312, U0207))
  • Certified with Windows 10
  • Certified with Red Hat Enterprise 7.1
  • Certified with CentOS Linux 7.1
  • Certified with Oracle Linux 7.1
  • Certified with SUSE Enterprise Server 12

Version 7.1.5

Certifications
  • Certified with Red Hat Enterprise 7.0
  • Certified with CentOS Linux 7.0
  • Certified with Oracle Linux 7.0

Version 7.1.4

Certifications
  • Certified with Windows 8.1

Version 7.1.3

Certifications
  • Certified with CentOS Linux 4.x, 5.x, and 6.x
  • Certified with Oracle Linux 4.x, 5.x, and 6.x
  • Certified with Oracle 12c

Version 7.1.2

Certifications
  • Certified with Oracle Solaris 11.1

Version 7.1.1

Certifications
  • Certified with Red Hat 6.3
  • Certified with Windows 8 and Windows Server 2012

Version 7.1.0

No changes for this release.



patch-whats-new

Read Next

What's new