SAP Sybase Adaptive Server Enterprise

Progress DataDirect Connect and Connect64 for ODBC Sybase Wire Protocol Driver

An asterisk (*) indicates support that was added in a hotfix or software patch subsequent to a release.

Version 7.1.6

Certifications
  • Certified with Red Hat Enterprise 7.3* (driver version 07.16.0209 (B0364, U0243))
  • Certified with Windows Server 2016* (driver version 07.16.0193 (B0349, U0232))
  • Certified with Debian Linux 7.11*, 8.5* (driver version 07.15.0158 (B0208, U0145))
  •  Certified with Ubuntu Linux 14.04*, 16.04* (driver version 07.15.0158 (B0208, U0145))  
  • Certified with Windows 10
  • Certified with Red Hat Enterprise 7.1
  • Certified with CentOS Linux 7.1
  • Certified with Oracle Linux 7.1
  • Certified with SUSE Enterprise Server 12
Enhancements
  • The default version of the OpenSSL library, 1.0.2r, has reached the end of its product life-cycle and has been upgraded to version 1.1.1d. In addition to receiving full update support, version 1.1.1d fixes the following security vulnerabilities:*
    • Padding Oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey (CVE-2019-1563)
    • Windows builds with insecure path defaults (CVE-2019-1552)
    • Fork Protection (CVE-2019-1549)
    • ECDSA remote timing attack (CVE-2019-1547)
    • ChaCha20-Poly1305 with long nonces (CVE-2019-1543)
    • Timing vulnerability in ECDSA signature generation (CVE-2018-0735) 

    Version 1.1.1d also addresses vulnerabilities resolved by earlier versions of the library. For more information on the installed library files, refer to the readme. 

    For more information on the OpenSSL vulnerabilities resolved by this upgrade, refer to the corresponding OpenSSL announcements at https://www.openssl.org/news/vulnerabilities-1.1.1.html.
  • The new AllowedOpenSSLVersions option determines which version of the OpenSSL library file the driver uses for data encryption when multiple versions are installed with the product. For example, when specifying a value of 1.1.1 (AllowedOpenSSLVersions=1.1.1) the driver uses the 1.1.1 version of the library that is installed with the driver.*
  • The default OpenSSL library version has been updated to 1.0.2r:*
  • The default OpenSSL library version has been updated to 1.0.2n.*
  • The default OpenSSL library version has been updated to 1.0.2k.*
  • The default OpenSSL library version has been updated to 1.0.2j.*
  • The default OpenSSL library version has been updated to 1.0.2h.*
  • The default OpenSSL library version has been updated to 1.0.2g.*
  • The default OpenSSL library version has been updated to 1.0.2f.
  • The new CryptoLibName and SSLLibName connection options allow you to  designate the OpenSSL libraries used when SSL is enabled.
Changed Behavior
  • The following Windows platforms have reached the end of their product lifecycle and are no longer supported by the driver*:
    • Windows 8.0 (versions 8.1 and higher are still supported)
    • Windows Vista (all versions)
    • Windows XP (all versions)
    • Windows Server 2003 (all versions)

Version 7.1.5

Certifications
  • Certified with Red Hat Enterprise 7.0
  • Certified with CentOS Linux 7.0
  • Certified with Oracle Linux 7.0
  • Certified with SAP Sybase Adaptive Server Enterprise 16
Enhancements
  • The OpenSSL library was upgraded to version 1.0.0r, which fixes the
    CVE‐2015‐0204 (FREAK) vulnerability. See "RSA silently downgrades
    to EXPORT_RSA [Client] (CVE‐2015‐0204)" at
    https://www.openssl.org/news/secadv_20150108.txt for more
    information.
  • The new PRNGSeedSource connection option allows you to specifies whether the
    driver uses a file or the RAND_poll function as the seed source for
    SSL key generation.
  • The new PRNGSeedFile connection option allows you to specify the
    entropy‐source file or device used as a seed for SSL key generation.
  • The new Crypto Protocol Version connection option allows you to specify
    the cryptographic protocols used when SSL is enabled. This option can be
    used to avoid vulnerabilities associated with SSLv3 and SSLv2, including
    the POODLE vulnerability.

Version 7.1.4

Certifications
  • Certified with Windows 8.1
Enhancements
  • The new KeepAlive connection option allows you to use TCP Keep Alive to maintain idle TCP connections.

Version 7.1.3

Certifications
  • Certified with CentOS Linux 4.x, 5.x, and 6.x
  • Certified with Oracle Linux 4.x, 5.x, and 6.x

Version 7.1.2

Certifications
  • Certified with Oracle Solaris 11.1

Version 7.1.1

Certifications
  • Certified with Red Hat 6.3
  • Certified with Windows 8 and Windows Server 2012

Version 7.1.0

No changes for this release.



patch-whats-new

Read Next

What's new