Security update for virtualbox

This update for virtualbox fixes the following issues:

- CVE-2017-10392: A local user can exploit a flaw in the Oracle VM VirtualBox Core component to partially access data, partially modify data, and deny service
- CVE-2017-10407: A local user can exploit a flaw in the Oracle VM VirtualBox Core component to partially access data, partially modify data, and deny service
- CVE-2017-10408: A local user can exploit a flaw in the Oracle VM VirtualBox Core component to partially access data, partially modify data, and deny service
- CVE-2017-10428: A local user can exploit a flaw in the Oracle VM VirtualBox Core component to partially access data, partially modify data, and partially deny service

The following packaging changes are included:

- Further to usage of vboxdrv if virtualbox-qt is not installed: updates to vboxdrv.sh (boo#1060072)
- The virtualbox package no longer requires libX11, an library module files were moved to virtualbox-qt

This update also contains all upstream improvements in the 5.1.30 release, including:

- Fix for double mouse cursor when using mouse integration without Guest Additions.
- Translation updates

Fixed bugs
bnc#1060072
virtualbox drivers vboxdrv don't work if virtualbox-qt is not installed
bnc#1064200
VUL-0: CVE-2017-10392,CVE-2017-10407,CVE-2017-10408,CVE-2017-3733,CVE-2017-10428: virtualbox: Oracle October 2017 release
bnc#1066488
VirtualBox guest kernel modules dont match current Leap 42.3 kernel
Selected Binaries
openSUSE Build Service is sponsored by