Security update for openssh

This update for openssh fixes the following issues:

Security vulnerabilities addressed:

- CVE-2019-6109: Fixed an character encoding issue in the progress display of
the scp client that could be used to manipulate client output, allowing
for spoofing during file transfers (bsc#1121816).
- CVE-2019-6111: Properly validate object names received by the scp client to
prevent arbitrary file overwrites when interacting with a malicious SSH server
(bsc#1121821).

Other issues fixed:

- Fixed two race conditions in sshd relating to SIGHUP (bsc#1119183).
- Returned proper reason for port forwarding failures (bsc#1090671).
- Fixed a double free() in the KDF CAVS testing tool (bsc#1065237).

This update was imported from the SUSE:SLE-12-SP2:Update update project.

Fixed bugs
bnc#1090671
Scenario: Bootstrap via XML-RPC a non-existing system caused a java exception
bnc#1131709
Possible problem (regression) with openssh update for SLE12/12-SP1 (S:M:10780:188599)
bnc#1121821
VUL-0: CVE-2019-6111: openssh,openssh-openssl1: scp client missing received object name validation
bnc#1121816
VUL-0: CVE-2019-6109: openssh-openssl1,openssh,putty: scp client spoofing via object name
bnc#1065237
FIPS: openssh: cavstest-kdf: corrupted double-linked list
bnc#1119183
sshd reload with multiple ports results in 'already in use' during bind
Selected Binaries
openSUSE Build Service is sponsored by