Skip to main content

VMware Server 1.0.2 Released!



This is a maintenance release over 1.0.1.

Resolved issues :

Issues Resolved in VMware Server 1.0.2

  • This release fixes certain memory leaks in VMware Tools on Windows guests.
  • The vm-support script, which collects log files and other system information, now collects the bootloader configuration file.
  • This release includes improved support for Intel family F processors.
  • This release includes new support for Intel Rockton processors.
  • This release fixes a bug that, under rare conditions, caused a crash when many virtual machines were booting under a heavy load.
  • This release includes prebuilt modules for VMware Tools for SuSE SLES 10.
  • This release fixes a bug that sometimes caused an assertion failure when calling VixVM_Open on an unregistered virtual machine.
  • Starting in this release, guest.commands.allowAnonRootGuestCommandsOnHost and guest.commands.allowAnonRootGuestCommands settings can no longer be included in the .vmx file. To affect all the virtual machines on the host, you can include these settings in the global configuration file $LIBDIR/settings or CommonAppData\settings.ini.
  • Kernel modules now build on 2.6.18 kernels.
  • Kernel modules now build on Debian's 2.6.17 kernels.
  • HGFS now builds on 2.6.18-rc1 kernels.
  • This release fixes a bug that occasionally caused a crash when uninstalling VMware Server just after resuming a Windows host system.
  • This release fixes a bug that occasionally crashed 64-bit Windows Server 2003 Enterprise Edition hosts with SP1.
  • This release fixes a bug that occasionally caused direct execution errors in V8086 mode when running 16-bit DOS applications in a Windows guest. This fix prevents direct execution errors that are caused by the sysenter instruction being improperly handled, and thus enables DOS applications to execute properly.
  • CD-ROM and DVD-ROM emulation now work correctly in Vista guests.
  • Vmnet compilation now works correctly for bridged networking on 2.6.18 or higher kernels.
  • This release fixes a bug that, under rare conditions, caused guest memory to become corrupted.
  • Second and subsequent snapshots no longer contain the absolute path to the base .vmdk file. This fix allows the virtual machine to be moved to another machine.
  • This release fixes a bug that, under rare conditions, caused a system panic with sunfire 4100 hardware on a RedHat 4 64-bit guest.
  • The vmware.exe -X option now starts the virtual machine in full screen mode.
  • This release fixes a bug that occasionally caused Windows guests with dual vmxnet adapters to lose network connectivity.
  • This release fixes a bug that occasionally caused a core dump when opening and powering on a FreeBSD6.0 guest and invoking VMware Tools.
  • VMware Server 1.0.1 now correctly uses 2-CPU licenses instead of 8-CPU licenses on quad core machines.
  • This release fixes a bug that occasionally caused a hang on RedHat Enterprise Linux 3 U5 virtual machines.

Security Issues Resolved in VMware Server 1.0.2

  • This release fixes a security issue that could allow a malicious user to crash Windows guest operating systems. Rub�n Santamarta of Reversemode discovered a vulnerability in the way that VMware delivered General Protection Faults to Windows guest operating systems, which is now fixed. The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the name CVE-2007-1069 to this issue.
  • This release fixes a security issue with the configuration program vmware-config, which could set incorrect permissions and umask on SSL key files. Local users might have been able to obtain access to the SSL key files. The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the name CVE-2006-3589 to this issue.
    Note: The affected files include /usr/bin/vmware-config.pl and /usr/bin/vmware-config-mui.pl.
  • RunProgramInGuest was being executed as SYSTEM in Windows guests. Now it executes as the user running it with that user's permissions.

Get it here!

Comments

Popular posts from this blog

DeepLearningTrucker Part 1

Avastu Blog is migrating to IdeationCloud.com; 1st Jan 2009 live

YOU DON'T HAVE TO DO ANYTHING. WITHIN 2 SECONDS YOU WILL BE REDIRECTED TO THE NEW HOME OF AVASTU BLOG. PLEASE DO UPDATE AVASTU BLOG'S URL to : http://www.ideationcloud.com on your website.

I will send out emails personally to those who are using my link(s) on their sites.

Thanks much for your co-operation and hope you enjoy the new site and its cool new features :-)




Not like the site is unlive or something..on the contrary, its beginning to get a lot of attention already. Well most of the work is done, you don't have to worry about anything though:

What won't change

Links/Referrals: I will be redirecting the links (all links which you may have cross-posted) to IdeationCloud.com - so you don't have to do anything in all your posts and links. Although, I would urge however that you do change the permalinks, especially on your blogs etc yourselfThis blog is not going away anywhere but within a few months, I will consider discontinuing its usage. I won't obviously do …

Cloud Security: Eliminate humans from the "Information Supply Chain on the Web"

My upcoming article, part - 3 data center predictions for 2009, has a slideshot talking about the transition from the current age to the cloud computing age to eventually the ideation age- the age where you will have clouds that will emote but they will have no internal employees.

Biggest management disasters occur because internal folks are making a mess of the playground.

Om's blog is carrying an article about Cloud security and it is rather direct but also makes a lot of sense:

I don’t believe that clouds themselves will cause the security breaches and data theft they anticipate; in many ways, clouds will result in better security. Here’s why: Fewer humans –Most computer breaches are the result of human error; only 20-40 percent stem from technical malfunctions. Cloud operators that want to be profitable take humans out of the loop whenever possible.Better tools – Clouds can afford high-end data protection and security monitoring tools, as well as the experts to run them. I trust…