D
DS1728558
I suggest - VMware-Workstation-Full-15.5.2 for Linux
Release Year: 2020
Version: 15.5.2 Build 15785246
Developer: https://www.vmware.com/products/workstation-pro.html
Developer's website: https://www.vmware.com
System requirements: 64-bit Intel Core 2 Duo x86 processor or equivalent, dual-core AMD Athlon ™ 64 FX processor or equivalent
1.3 GHz or higher core speed
Minimum 2 GB of RAM / 4 GB of RAM recommended
1.2 GB of free disk space for the app. Additional hard disk space is required for each VM. Please contact the recommended disk space providers for specific guest operating systems
Architecture: x86, amd64
Treatment - present
Interface language: English
MD5: 11e7933ab27c7e70e399d2de2e217235
Description: VMware VMware Workstation 15.5 is designed for virtualization of various systems. Windows, Linux, or Mac OS and fully work in it. If you want to test a new system, you don't need to reinstall the old one.all you need to do is create a virtual computer using a Russifier and install the desired system on it. The virtual system can be used for testing various software, and it can also be used for installing suspicious applications.
Additional information: this release of VMware Workstation Pro is a free update for all users of VMware Workstation 15 Pro. It contains bug fixes and security updates.
This release of VMware Workstation Pro addresses the following issues:
Workstation 15.5.2 Pro fixes the use-after-free vulnerability in vmnetdhcp. Project "common vulnerabilities and risks" (cve.mitre.org) assigned this issue the ID CVE-2020-3947. For more information, see In the VMSA-2020-0004 section.
Workstation 15.5.2 Pro addresses a local privilege escalation vulnerability in Cortado Thinprint. Common vulnerabilities and risks project (cve.mitre.org) assigned this issue the ID CVE-2020-3948. For more information, see In the VMSA-2020-0004 section.
Workstation 15.5.2 Pro addresses a vulnerability related to privilege escalation. Common vulnerabilities and risks project (cve.mitre.org) assigned this issue the ID CVE-2019-5543. For more information, see In the VMSA-2020-0004 section.
Fed Fedora 31.
my link to the archive - https://mega.nz/folder/VnIGQSYa#-OsRf5w3CCRWnwDB8f6Qsw
Release Year: 2020
Version: 15.5.2 Build 15785246
Developer: https://www.vmware.com/products/workstation-pro.html
Developer's website: https://www.vmware.com
System requirements: 64-bit Intel Core 2 Duo x86 processor or equivalent, dual-core AMD Athlon ™ 64 FX processor or equivalent
1.3 GHz or higher core speed
Minimum 2 GB of RAM / 4 GB of RAM recommended
1.2 GB of free disk space for the app. Additional hard disk space is required for each VM. Please contact the recommended disk space providers for specific guest operating systems
Architecture: x86, amd64
Treatment - present
Interface language: English
MD5: 11e7933ab27c7e70e399d2de2e217235
Description: VMware VMware Workstation 15.5 is designed for virtualization of various systems. Windows, Linux, or Mac OS and fully work in it. If you want to test a new system, you don't need to reinstall the old one.all you need to do is create a virtual computer using a Russifier and install the desired system on it. The virtual system can be used for testing various software, and it can also be used for installing suspicious applications.
Additional information: this release of VMware Workstation Pro is a free update for all users of VMware Workstation 15 Pro. It contains bug fixes and security updates.
This release of VMware Workstation Pro addresses the following issues:
Workstation 15.5.2 Pro fixes the use-after-free vulnerability in vmnetdhcp. Project "common vulnerabilities and risks" (cve.mitre.org) assigned this issue the ID CVE-2020-3947. For more information, see In the VMSA-2020-0004 section.
Workstation 15.5.2 Pro addresses a local privilege escalation vulnerability in Cortado Thinprint. Common vulnerabilities and risks project (cve.mitre.org) assigned this issue the ID CVE-2020-3948. For more information, see In the VMSA-2020-0004 section.
Workstation 15.5.2 Pro addresses a vulnerability related to privilege escalation. Common vulnerabilities and risks project (cve.mitre.org) assigned this issue the ID CVE-2019-5543. For more information, see In the VMSA-2020-0004 section.
Fed Fedora 31.
my link to the archive - https://mega.nz/folder/VnIGQSYa#-OsRf5w3CCRWnwDB8f6Qsw
Last edited by a moderator: