Progress DataDirect Connect XE and Connect64 XE for ODBC Greenplum Wire Protocol Driver
An asterisk (*) indicates support that was added in a hotfix or software patch subsequent to a release.
- Certified with Windows 10
- Certified with Red Hat Enterprise 7.1
- Certified with CentOS Linux 7.1
- Certified with Oracle Linux 7.1
- Certified with SUSE Enterprise Server 12
The drivers have been updated with OpenSSL library version 1.0.2h, which addresses the following security vulnerabilities*:
- "Padding oracle in AES-NI CBC MAC check" (CVE-2016-2107)
- "EVP_EncodeUpdate overflow" (CVE-2016-2105)
- "EVP_EncryptUpdate overflow" (CVE-2016-2106)
- "ASN.1 BIO excessive memory allocation" (CVE-2016-2109)
- "EBCDIC overread" (CVE-2016-2176)
Version 1.0.2h also addresses the following vulnerabilities resolved by earlier versions of the library.
Originally resolved by the version 1.0.2g upgrade:
- "missing Memory allocation success checks in doapr_outch function in
- "Cross‐protocol attack on TLS using SSLv2 (DROWN)" (CVE‐2016‐0800)
- "memory issues in BIO_*printf functions" (CVE‐2016‐0799)
- "Memory leak in SRP database lookups" (CVE‐2016‐0798)
- "Double‐free in DSA code" (CVE‐2016‐0705)
- "Side channel attack on modular exponentiation" (CVE-2016-0702)
Originally resolved by the version 1.0.2.f upgrade:
For more information on the OpenSSL vulnerabilities resolved by this upgrade,
refer to the corresponding OpenSSL announcements at
- Provides stronger cryptographic assurance against the "Logjam" vulnerability (CVE‐2015‐4000)
- "DH small subgroups" (CVE‐2016‐0701)
- "SSLv2 doesn't block disabled ciphers" (CVE‐2015‐3197)
- "BN_mod_exp may produce incorrect results on x86_64" (CVE‐2015‐3193)
- "Certificate verify crash with missing PSS parameter"(CVE‐2015‐3194)
- "X509_ATTRIBUTE memory leak" (CVE‐2015‐3195)
- The default OpenSSL library version has been updated to 1.0.2g.*
- The default OpenSSL library version has been updated to 1.0.2f.
- The new CryptoLibName and SSLLibName connection options allow you to
designate the OpenSSL libraries used when SSL is enabled.
- The driver has been enhanced to support Kerberos Authentication.
- The AuthenticationMethod connection option has been refreshed with a new valid value for enabling Kerberos Authentication. To use Kerberos authentication with the driver, set AuthenticationMethod=4.
- Certified with Red Hat Enterprise 7.0
- Certified with CentOS Linux 7.0
- Certified with Oracle Linux 7.0
- Certified with Greenplum 4.3
- The OpenSSL library was upgraded to version 1.0.0r, which fixes the
CVE‐2015‐0204 (FREAK) vulnerability. See "RSA silently downgrades
to EXPORT_RSA [Client] (CVE‐2015‐0204)" at
https://www.openssl.org/news/secadv_20150108.txt for more
- The new Crypto Protocol Version connection option allows you to specify
the cryptographic protocols used when SSL is enabled. This option can be
used to avoid vulnerabilities associated with SSLv3 and SSLv2, including
the POODLE vulnerability.
- The new Unbounded Numeric Precision connection option allows you to
define the precision for unbounded NUMERIC columns when described
within the column, parameter, result set, or table metadata.
- The new Unbounded Numeric Scale connection option allows you to
define the scale for unbounded NUMERIC columns described within
the column, parameter, result set, or table metadata.
- Certified with Windows 8.1
The new KeepAlive connection option allows you to
use TCP Keep Alive to maintain idle TCP connections.
- Certified with CentOS Linux 4.x, 5.x, and 6.x
- Certified with Oracle Linux 4.x, 5.x, and 6.x
- Support for SSL data encryption.
- Certified with Oracle Solaris 11.1
- Certified with Red Hat 6.3
- Certified with Windows 8 and Windows Server 2012
- Certified with Greenplum 4.2