VMware Workstation 15.5.2 Player | 12 March 2020 | Build 15785246 |
What's in the Release Notes
- About VMware Workstation Player
- What's New
- Important Fixes
- Prior Releases
- Resolved Issues
- Known Issues
About VMware Workstation Player
VMware Workstation Player™ is a streamlined desktop virtualization application that runs another operating system on the same computer without rebooting. VMware Workstation Player provides a simple user interface, unmatched operating system support, and portability across the VMware ecosystem.
For more information, see the broader VMware Workstation Player documentation.
What's New
This release of VMware Workstation Player is a free upgrade for all VMware Workstation 15 Player users. It contains bug fixes and security updates.
Important Fixes
This release of VMware Workstation Player addresses the following issues:
- Workstation 15.5.2 Player addresses a use-after-free vulnerability in vmnetdhcp. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2020-3947 to this issue. For more information, see VMSA-2020-0004.
- Workstation 15.5.2 Player addresses a local privilege escalation vulnerability in Cortado Thinprint. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2020-3948 to this issue. For more information, see VMSA-2020-0004.
- Workstation 15.5.2 Player addresses a privilege escalation vulnerability. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2019-5543 to this issue. For more information, see VMSA-2020-0004.
- Workstation 15.5.2 Player introduces a security check to notify users when a remote OVA/OVF is being imported. VMware would like to thank Daniel Sese Benjumea and Manuel Fernandez-Aramburu working with Trend Micro Zero Day Initiative.
Prior Releases
Features and Known Issues from prior releases of VMware Workstation 15 Player are described in the release notes for each release. To view the release notes for a prior release, click the appropriate link: