This update for OpenSSH fixes the following issues:
Prevent user enumeration through the timing of password processing.
(bsc#989363, CVE-2016-6210)
Allow lowering the DH groups parameter limit in server as well as when GSSAPI
key exchange is used. (bsc#948902)
Sanitize input for xauth(1). (bsc#970632, CVE-2016-3115)
Prevent X11 SECURITY circumvention when forwarding X11 connections.
(bsc#962313, CVE-2016-1908)
Disable DH parameters under 2048 bits by default and allow lowering the limit back
to the RFC 4419 specified minimum through an option. (bsc#932483, bsc#948902)
Ignore PAM environment when using login. (bsc#975865, CVE-2015-8325)
Limit the accepted password length (prevents a possible denial of service).
(bsc#992533, CVE-2016-6515)
Relax version requires for the openssh-askpass sub-package. (bsc#962794)
Avoid complaining about unset DISPLAY variable. (bsc#981654)
Initialize message id to prevent connection breakups in some cases. (bsc#959096)