Home Partners Company

SAP Sybase Adaptive Server Enterprise

Progress DataDirect Connect and Connect64 for ODBC Sybase Wire Protocol Driver

An asterisk (*) indicates support that was added in a hotfix or software patch subsequent to a release.

Version 7.1.6

Certifications
  • Certified with Windows 10
  • Certified with Red Hat Enterprise 7.1
  • Certified with CentOS Linux 7.1
  • Certified with Oracle Linux 7.1
  • Certified with SUSE Enterprise Server 12
Enhancements
  • The drivers have been updated with OpenSSL library version 1.0.2h, which addresses the following security vulnerabilities*:

    • "Padding oracle in AES-NI CBC MAC check" (CVE-2016-2107)
    • "EVP_EncodeUpdate overflow" (CVE-2016-2105)
    • "EVP_EncryptUpdate overflow" (CVE-2016-2106)
    • "ASN.1 BIO excessive memory allocation" (CVE-2016-2109)
    • "EBCDIC overread" (CVE-2016-2176)

    Version 1.0.2h also addresses the following vulnerabilities resolved by earlier versions of the library.

    Originally resolved by the version 1.0.2g upgrade:

    • "missing Memory allocation success checks in doapr_outch function in
      crypto/bio/b_print.c" (CVE‐2016‐2842)
    • "Cross‐protocol attack on TLS using SSLv2 (DROWN)" (CVE‐2016‐0800)
    • "memory issues in BIO_*printf functions" (CVE‐2016‐0799)
    • "Memory leak in SRP database lookups" (CVE‐2016‐0798)
    • "Double‐free in DSA code" (CVE‐2016‐0705)
    • "Side channel attack on modular exponentiation" (CVE-2016-0702)

    Originally resolved by the version 1.0.2.f upgrade:

    • Provides stronger cryptographic assurance against the "Logjam" vulnerability (CVE‐2015‐4000)
    • "DH small subgroups" (CVE‐2016‐0701)
    • "SSLv2 doesn't block disabled ciphers" (CVE‐2015‐3197)
    • "BN_mod_exp may produce incorrect results on x86_64" (CVE‐2015‐3193)
    • "Certificate verify crash with missing PSS parameter"(CVE‐2015‐3194)
    • "X509_ATTRIBUTE memory leak" (CVE‐2015‐3195)
    For more information on the OpenSSL vulnerabilities resolved by this upgrade, refer to the corresponding OpenSSL announcements at https://www.openssl.org/news/openssl-1.0.2-notes.html.
  • The default OpenSSL library version has been updated to 1.0.2g.*
  • The default OpenSSL library version has been updated to 1.0.2f.
  • The new CryptoLibName and SSLLibName connection options allow you to  designate the OpenSSL libraries used when SSL is enabled.

Version 7.1.5

Certifications
  • Certified with Red Hat Enterprise 7.0
  • Certified with CentOS Linux 7.0
  • Certified with Oracle Linux 7.0
  • Certified with SAP Sybase Adaptive Server Enterprise 16
Enhancements
  • The OpenSSL library was upgraded to version 1.0.0r, which fixes the
    CVE‐2015‐0204 (FREAK) vulnerability. See "RSA silently downgrades
    to EXPORT_RSA [Client] (CVE‐2015‐0204)" at
    https://www.openssl.org/news/secadv_20150108.txt for more
    information.
  • The new PRNGSeedSource connection option allows you to specifies whether the
    driver uses a file or the RAND_poll function as the seed source for
    SSL key generation.
  • The new PRNGSeedFile connection option allows you to specify the
    entropy‐source file or device used as a seed for SSL key generation.
  • The new Crypto Protocol Version connection option allows you to specify
    the cryptographic protocols used when SSL is enabled. This option can be
    used to avoid vulnerabilities associated with SSLv3 and SSLv2, including
    the POODLE vulnerability.

Version 7.1.4

Certifications
  • Certified with Windows 8.1
Enhancements
  • The new KeepAlive connection option allows you to use TCP Keep Alive to maintain idle TCP connections.

Version 7.1.3

Certifications
  • Certified with CentOS Linux 4.x, 5.x, and 6.x
  • Certified with Oracle Linux 4.x, 5.x, and 6.x

Version 7.1.2

Certifications
  • Certified with Oracle Solaris 11.1

Version 7.1.1

Certifications
  • Certified with Red Hat 6.3
  • Certified with Windows 8 and Windows Server 2012

Version 7.1.0

No changes for this release.



patch-whats-new

Read Next

What's new