Fri. Dec 6th, 2019

VMware Workstation Pro 15.5.1 released: Fix high-security vulnerabilities

1 min read

VMware Workstation Pro 15.5.1 provides the leading features and performance that a professional technician relies on every day when using a virtual machine. With the latest versions of Windows and Linux, the latest processors and hardware support, and the ability to connect to VMware vSphere and vCloud Air, it’s the perfect tool to increase productivity, save time, and conquer cloud computing.

Changelog

his release of VMware Workstation Pro addresses the following issues:

  • Workstation 15.5.1 Pro addresses an out-of-bounds write vulnerability in the e1000e virtual network adapter. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2019-5541 to this issue. For more information, see VMSA-2019-0021.
  • Workstation 15.5.1 Pro addresses an information disclosure vulnerability in vmnetdhcp. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2019-5540 to this issue. For more information, see VMSA-2019-0021.
  • Workstation 15.5.1 Pro addresses a denial-of-service vulnerability in the RPC handler. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2019-5542 to this issue. For more information, see VMSA-2019-0021.
  • Workstation 15.5.1 Pro resolves TSX Asynchronous Abort (TAA), a speculative-execution vulnerability identified by CVE-2019-11135. For more information, see section 3b in VMSA-2019-0020.
  • Workstation 15.5.1 Pro resolves a regression introduced in Workstation 15.5.0 Pro which causes the Hypervisor-Specific mitigations for L1TF and MDS vulnerabilities to be ineffective. For more information on these mitigations, please see section 3a in VMSA-2019-0008.