VMware 歷史版本列表
VMware 是通過遠程連接運行和管理虛擬操作系統的最流行和廣泛使用的應用程序之一。通過提供廣泛的操作系統支持,行業領先的功能集,高性能工具和豐富的用戶體驗,VMware 代表了嚴肅的個人電腦愛好者,技術專業人員和企業誰想要獲得世界上最好的工具的完美伴侶. 選擇版本:VMware 服務器 2.0.2 Build 203138 VMware 播放器 14.1.0 Build 7370693 VMwa... VMware 軟體介紹VMware Workstation PlayerVMware ServerVMware Workstation Pro
更新時間:2009-04-03
更新細節:
更新時間:2009-04-02
更新細節:
What's new in this version:
With this release of VMware Player, certain new features and support have been added.
Support for New Guest Operating Systems
VMware provides support for the following operating systems for Player 2.5.2:
- Windows Vista Service Pack 1 and Service Pack 2
- Asianux Server 3.0 Service Pack 1
- openSUSE 11.1
- Ubuntu 8.10
- Ubuntu 8.04 LTS
VMware provides experimental support to the following operating systems for Player:
- Asianux Server 3 Service Pack 1
- Fedora 11
- FreeBSD 7.1
- Mandriva Linux 2009
- Microsoft Windows 7
- Novell SLE11.0
- Red Hat Enterprise Linux 5.3
- Red Hat Enterprise Linux 4.8
- Sun Solaris 10 Update 6
- Ubuntu 9.04
更新時間:2008-11-24
更新細節:
What's new in this version:
- Japanese localization — A localized version of VMware Player is now available in Japanese for Windows hosts.
- Smart card support for Linux guests — Smart cards are now experimentally supported with Linux guests.
- Unity mode on Linux guests — Although support for Unity mode on Linux guests is still experimental, repainting of application windows is much improved.
- 3-D graphics — Additional improvements have been made to improve 3-D performance on Windows XP guests.
更新時間:2008-09-24
更新細節:
What's new in this version:
New Support for 32-Bit and 64-Bit Operating Systems
This release provides experimental support for the following operating systems:
- 32-bit and 64-bit Microsoft Windows Preinstallation environment (all versions) as a guest operating system
- 32-bit and 64-bit Microsoft Windows Recovery environment as a guest operating system
- 32-bit and 64-bit Ubuntu LTS 8.04.1 as a guest operating system
This release provides full support for the following operating systems in addition to those operating systems supported in previous releases:
- 32-bit and 64-bit Microsoft Windows 2008 Standard Server, Data Center, Enterprise, and Small Business Server as guest operating systems without Hyper-V
- 32-bit and 64-bit Asianux 3 as a guest operating system
- 32-bit and 64-bit CentOS 5.0-5.2 as host and guest operating systems
- 32-bit and 64-bit Oracle Enterprise Linux 5.0-5.2 as host and guest operating systems
- 32-bit and 64-bit Red Hat Enterprise Linux 4, Update 7 (Workstation, Enterprise Server, and Advanced Server) as host and guest operating systems
- 32-bit and 64-bit Red Hat Enterprise Linux 5.1 and 5.2 (Advanced Platform, Desktop, and Server) as host and guest operating systems
- 32-bit and 64-bit SUSE Linux Enterprise Desktop 10 and 10 SP1 and SP2 as host and guest operating systems
- 32-bit SUSE Linux Enterprise Server 10 SP2 as a guest operating system
- 32-bit and 64-bit Mandriva Linux 2008 as a guest operating system
- 32-bit and 64-bit Ubuntu LTS 8.04 as host and guest operating systems
- 32-bit and 64-bit Solaris 10 Operating System for x86 Platforms, 10 5/08 (Update 5), as a guest operating system
- Note: In the VMware Player Getting Started Guide, the following operating systems should not be listed as supported for this release: 32-bit and 64-bit CentOS 5.3, Oracle Enterprise Linux 5.3, and Red Hat Enterprise Linux 4.8. In addition, only Microsoft Windows 2008 operating systems without Hyper-V are supported.
Major New Features:
- Unity view — Integrate your favorite guest applications with your host. Open the application window, enter Unity view, and the VMware Player window is automatically minimized. The guest application windows look just like host application windows, but with color-coded borders. You can access the virtual machine's Start menu (for Windows virtual machines) or Applications menu (for Linux virtual machines) by placing the mouse pointer over the host's Start or Applications menu, or by using a key combination.
- Installer bundle for Linux hosts — Installing VMware Player on Linux hosts just got a lot easier. The new bundle format provides a graphical UI wizard for most Linux operating systems. With a few mouse clicks, VMware Player is installed. For users who want a custom installation, a command-line interface provides complete control.
- Accelerated 3-D graphics on Windows XP guests — VMware Player 2.5 virtual machines now work with applications that use DirectX 9 accelerated graphics with shaders up through Shader Model 2.0 on Windows XP guests. Hosts can be running Windows 2000, Windows XP, Windows Vista, or Linux.
Usability Enhancements:
- Full screen mode — While in full screen mode, you can now switch from one powered-on virtual machine to another.
- Suspend and exit — Both Windows and Linux hosts now support suspending the virtual machine when exiting.
- Change preferences — Set preferences, such as how devices are displayed in VMware Player.
- Expanded in-product help system — When you choose Help > Help Topics, or click a Help button in a dialog box, you have access to twice as much content as was provided in VMware Player 2.0.
Performance Improvements:
- Folder sharing and dragging, dropping, copying, and pasting text and files — Transferring files between virtual machines or between host and guests using these features is up to 25 percent faster.
- Memory allocation — Change the amount of memory allocated to the virtual machine.
New Platform Capabilities:
- (Experimental) Support for smart cards in virtual machines — You can plug a smart card reader into a host and insert your smart card to authenticate yourself on your host or on a guest. Smart cards can be shared between the host and guests or between guests.
- Text copy and paste enhancements — On Windows guests, you can copy and paste text in rich text format, and copy up to 4MB of text. (On Linux guests, the old limitations still apply. You can copy and paste up to 64K of plain text.)
更新時間:2008-09-24
更新細節:
What's new in this version:
The wait for VMware Server 2 is over and it’s better than ever! The next generation VMware Server equips you with a stable, easy-to-use hosted virtualization platform. In beta since November 2007, VMware Server 2 introduces numerous enhancements including new operating system support, 64-bit operating system support, increased virtual machine scalability, new management tools and more.
更新時間:2008-08-29
更新細節:
What's new in this version:
Player 2.0.5 addresses the following security issues:
Setting ActiveX killbit:
- Starting from this release, VMware has set the killbit on its ActiveX controls. Setting the killbit ensures that ActiveX controls cannot run in Internet Explorer (IE), and avoids security issues involving ActiveX controls in IE. See the KB article 240797 available from Microsoft and the related references on this topic.
- Security vulnerabilities have been reported for ActiveX controls provided by VMware when run in IE. Under specific circumstances, exploitation of these ActiveX controls might result in denial-of-service or allow running of arbitrary code when the user browses a malicious Web site or opens a malicious file in IE browser. An attempt to run unsafe ActiveX controls in Internet Explorer might result in pop-up windows warning the user.
- Note: IE can be configured to run unsafe ActiveX controls without prompting. VMware recommends that you retain the default settings in IE, which prompts when unsafe actions are requested.
- Earlier, VMware had issued knowledge base articles, KB 5965318 and KB 9078920 on security issues with ActiveX controls.
- To avoid malicious scripts that exploit ActiveX controls, do not enable unsafe ActiveX objects in your browser settings. As a best practice, do not browse untrusted Web sites as an administrator and do not click OK or Yes if prompted by IE to allow certain actions.
- The Common Vulnerabilities and Exposures has assigned the names CVE-2008-3691, CVE-2008-3692, CVE-2008-3693, CVE-2008-3694, CVE-2008-3695, CVE-2007-5438, and CVE-2008-3696 to the security issues with VMware ActiveX controls.
Update to FreeType:
- FreeType 2.3.6 resolves an integer overflow vulnerability and other vulnerabilities that can allow malicious users to run arbitrary code or might cause a denial-of-service after reading a maliciously crafted file. This release updates FreeType to its latest version 2.3.7.
- The Common Vulnerabilities and Exposures has assigned the names CVE-2008-1806, CVE-2008-1807, and CVE-2008-1808 to the issues resolved in FreeType 2.3.6.
Update to Cairo:
- Cairo 1.4.12 resolves an integer overflow vulnerability that can allow malicious users to run arbitrary code or might cause a denial-of-service after reading a maliciously crafted PNG file. This release updates Cairo to its latest version 1.4.14. The Common Vulnerabilities and Exposures has assigned the name CVE-2007-5503 to the issue resolved in Cairo 1.4.12.
更新時間:2008-08-29
更新細節:
What's new in this version:
Server 1.0.7 addresses the following security issues:
Security Fix for VMware ISAPI Extension:
- Internet Server Application Programming Interface (ISAPI) is an API that extends the functionality of Internet Information Server (IIS). VMware uses ISAPI extensions in its Server product.
- One of the ISAPI extensions provided by VMware is vulnerable to a remote denial of service. By sending a malformed request, IIS might shut down. IIS 6.0 restarts automatically. However, IIS 5.0 does not restart automatically when its Startup Type is set to Manual.
- The Common Vulnerabilities and Exposures has assigned the name CVE-2008-3697 to this issue.
Setting ActiveX killbit:
- From this release, VMware has set the killbit on its ActiveX controls. Setting the killbit ensures that ActiveX controls cannot run in Internet Explorer (IE), and avoids security issues involving ActiveX controls in IE. See the KB article 240797 from Microsoft and the related references on this topic.
- Security vulnerabilities have been reported for ActiveX controls provided by VMware when run in IE. Under specific circumstances, exploitation of these ActiveX controls might result in denial-of-service or can allow running of arbitrary code when the user browses a malicious Web site or opens a malicious file in IE browser. An attempt to run unsafe ActiveX controls in IE might result in pop-up windows warning the user.
- Note: IE can be configured to run unsafe ActiveX controls without prompting. VMware recommends that you retain the default settings in IE, which prompts when unsafe actions are requested.
- Earlier, VMware had issued knowledge base articles, KB 5965318 and KB 9078920 on security issues with ActiveX controls.
- To avoid malicious scripts that exploit ActiveX controls, do not enable unsafe ActiveX objects in your browser settings. As a best practice, do not browse untrusted Web sites as an administrator and do not click OK or Yes if prompted by IE to allow certain actions.
- The Common Vulnerabilities and Exposures has assigned the names CVE-2008-3691, CVE-2008-3692, CVE-2008-3693, CVE-2008-3695, CVE-2007-5438, and CVE-2008-3696 to the security issues with VMware ActiveX controls.
Security Fix for Local Privilege Escalation on Host System:
- This release fixes a privilege escalation vulnerability in host operating systems. Exploitation of this vulnerability allows users to run arbitrary code on the host system with elevated privileges.
- The Common Vulnerabilities and Exposures has assigned the name CVE-2008-3698 to this issue.
Update to Freetype:
- FreeType 2.3.6 resolves an integer overflow vulnerability and other vulnerabilities that can allow malicious users to run arbitrary code or might cause a denial-of-service after reading a maliciously crafted file. This release updates FreeType to its latest version 2.3.7.
- The Common Vulnerabilities and Exposures has assigned the names CVE-2008-1806, CVE-2008-1807, and CVE-2008-1808 to the issues resolved in Freetype 2.3.6.
更新時間:2008-05-30
更新細節:
What's new in this version:
VMware Player 2.0.4 addresses the following security issues:
- On Windows hosts, if VMCI is enabled, a guest can execute arbitrary code in the context of the vmx process on the host. This is a compiler-dependent vulnerability. The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the CVE number CVE-2008-2099 to this issue. (bug 234208)
- A security vulnerability related to the host-guest file system (HGFS) could cause a buffer overflow. The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the CVE number CVE-2008-2098 to this issue. (bug 234214)
更新時間:2008-05-30
更新細節:
What's new in this version:
Issues Resolved in VMware Server 1.0.6:
- Virtual machines fail unexpectedly after a Symantec virus definition update from version 213 to version 220.
bug 252341
- Previous versions of VMware Server allowed using the VIX API from the guest operating system. In VMware Server 1.0.6 this is no longer allowed by default. This feature can be enabled in VMware Server 1.0.6 by setting a new parameter in the configuration (.vmx) file: vix.inGuest.enable="TRUE"
更新時間:2008-03-17
更新細節:
What's new in this version:
- On Windows hosts, if you have configured and enabled a shared folder, it is possible for an attacker to write arbitrary content from a guest system to arbitrary locations on the host system (CORE-2007-0930). (bug 200360)
- This release updates the libpng library to version 1.2.22 to remove various security vulnerabilities. (bug 224453)