PostgreSQL

Progress DataDirect Connect and Connect64 for ODBC PostgreSQL Wire Protocol Driver

An asterisk (*) indicates support that was added in a hotfix or software patch subsequent to a release.

Version 7.1.6

Certifications
  • Certified with PostgreSQL 10.1* (driver version 07.16.0291 (B0404, U0264))
  • Certified with EDB Postgres Advanced Server 10.1* (driver version 07.16.0291 (B0404, U0264))
  • Certified with Red Hat Enterprise 7.3* (driver version 07.16.0280 (B0364, U0243))
  • Certified with Windows Server 2016* (driver version 07.16.0264 (B0332, U0218)) 
  • Certified with PostgreSQL 9.5*, 9.6* (driver version 07.16.0252 (B0304, U0205))
  • Certified with Debian Linux 7.11*, 8.5* (driver version 07.16.0251 (B0302, U0201))
  • Certified with Ubuntu Linux 14.04*, 16.04* (driver version 07.16.0251 (B0302, U0201))
  • Certified with Windows 10
  • Certified with Red Hat Enterprise 7.1
  • Certified with CentOS Linux 7.1
  • Certified with Oracle Linux 7.1
  • Certified with SUSE Enterprise Server 12
Enhancements
  • The driver has been updated with OpenSSL library version 1.0.2n, which addresses the following security vulnerabilities:*
    • rsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738)
    • Read/write after SSL object in error state (CVE-2017-3737)
    • bn_sqrx8x_internal carry bug on x86_64 (CVE-2017-3736)
    • Malformed X.509 IPAddressFamily could cause OOB read (CVE-2017-3735)

    Version 1.0.2n also addresses the following vulnerabilities resolved by earlier versions of the library.

    For more information on the OpenSSL vulnerabilities resolved by this upgrade, refer to the corresponding OpenSSL announcements at https://www.openssl.org/news/vulnerabilities-1.0.2.html.
  • The driver has been updated with OpenSSL library version 1.0.2k.*
    Note: OpenSSL library 1.0.2k has been replaced with version 1.0.2n.
  • The default OpenSSL library version has been updated to 1.0.2j.*
    Note: OpenSSL library 1.0.2j has been replaced with version 1.0.2n.
  • The default OpenSSL library version has been updated to 1.0.2h.*
    Note: OpenSSL library 1.0.2h has been replaced with version 1.0.2n.
  • The default OpenSSL library version has been updated to 1.0.2g.*
    Note: OpenSSL library 1.0.2g has been replaced with version 1.0.2n.
  • The default OpenSSL library version has been updated to 1.0.2f.
    Note: OpenSSL library 1.0.2f has been replaced with version 1.0.2n.
  • Support for Kerberos Authentication.
  • The new CryptoLibName and SSLLibName connection options allow you to 
     designate the OpenSSL libraries used when SSL is enabled.

Version 7.1.5

Certifications
  • Certified with Red Hat Enterprise 7.0
  • Certified with CentOS Linux 7.0
  • Certified with Oracle Linux 7.0
  • Certified with PostgreSQL 9.3, 9.4
Enhancements
  • The OpenSSL library was upgraded to version 1.0.0r, which fixes the
    CVE‐2015‐0204 (FREAK) vulnerability. See "RSA silently downgrades
    to EXPORT_RSA [Client] (CVE‐2015‐0204)" at
    https://www.openssl.org/news/secadv_20150108.txt for more
    information.
  • The new Crypto Protocol Version connection option allows you to specify
    the cryptographic protocols used when SSL is enabled. This option can be
    used to avoid vulnerabilities associated with SSLv3 and SSLv2, including
    the POODLE vulnerability.
  • The new Unbounded Numeric Precision connection option allows you to
    define the precision for unbounded NUMERIC columns described
    within the column, parameter, result set, or table metadata.
  • The new Unbounded Numeric Scale connection option allows you to
    define the scale for unbounded NUMERIC columns described within
    the column, parameter, result set, or table metadata.

Version 7.1.4

Certifications
  • Certified with Windows 8.1
Enhancements
  • The new KeepAlive connection option allows you to use TCP Keep Alive to maintain idle TCP connections.

Version 7.1.3

Certifications
  • Certified with CentOS Linux 4.x, 5.x, and 6.x
  • Certified with Oracle Linux 4.x, 5.x, and 6.x
Changed Behavior
  • The EncryptionMethod connection option now supports Request SSL
    functionality. When Request SSL is enabled, login requests and data are
    encrypted if the server is configured for SSL. If the server is not
    configured for SSL, an unencrypted connection is established.

Version 7.1.2

Certifications
  • Certified with Oracle Solaris 11.1
  • Certified with PostgreSQL 9.2

Version 7.1.1

Certifications
  • Certified with Red Hat 6.3
  • Certified with Windows 8 and Windows Server 2012

Version 7.1.0

No changes for this release.



patch-whats-new

Read Next

What's new