Security update for openssh

This update for OpenSSH fixes three security issues.

These security issues were fixed:
- CVE-2016-3115: Sanitise input for xauth(1) (bsc#970632)
- CVE-2016-1908: Prevent X11 SECURITY circumvention when forwarding X11 connections (bsc#962313)
- CVE-2015-8325: Ignore PAM environment when using login (bsc#975865)

These non-security issues were fixed:
- Fix help output of sftp (bsc#945493)
- Restarting openssh with openssh-fips installed was not working correctly (bsc#945484)
- Fix crashes when /proc is not available in the chroot (bsc#947458)
- Correctly parse GSSAPI KEX algorithms (bsc#961368)
- More verbose FIPS mode/CC related documentation in README.FIPS (bsc#965576, bsc#960414)
- Fix PRNG re-seeding (bsc#960414, bsc#729190)
- Disable DH parameters under 2048 bits by default and allow lowering the limit back to the RFC 4419 specified minimum through an option (bsc#932483, bsc#948902)

This update was imported from the SUSE:SLE-12:Update update project.

Fixed bugs
bnc#945493
Can't connect to lich.qam.suse.de after the update
bnc#945484
openssh deamon fails to restart after update
bnc#947458
L3-Question: sftp chroot failure after update to SLES 11 SP4
bnc#729190
prng patch in openssh does not handle overflow in seeding
bnc#932483
VUL-1: openssh: The Logjam Attack / weakdh.org
bnc#948902
sftp failures after installation of openssh 6.2p2-0.21.1
bnc#960414
sftp upload fails at 36gb, using sftp from openSSH
bnc#961368
ssh+kerberos: GSSAPIKeyExchange does not work
bnc#962313
VUL-1: CVE-2016-1908: openssh: possible fallback from untrusted to trusted X11 forwarding
bnc#965576
openssh daemon does not start in FIPS mode
bnc#970632
VUL-0: CVE-2016-3115: openssh: Missing sanitisation of untrusted input allows anauthenticated user who is able to request X11 forw...
bnc#975865
VUL-0: CVE-2015-8325: openssh: ignore PAM environment vars when UseLogin=yes
Selected Binaries
openSUSE Build Service is sponsored by