quassel is vulnerable to denial of service. A NULL pointer dereference in the onReadyRead
function in core/coreauthhandler.cpp
allows remote attackers to crash the application via malicious handshake data.
lists.fedoraproject.org/pipermail/package-announce/2016-May/183571.html
lists.fedoraproject.org/pipermail/package-announce/2016-May/183585.html
lists.fedoraproject.org/pipermail/package-announce/2016-May/183746.html
lists.opensuse.org/opensuse-updates/2016-05/msg00063.html
quassel-irc.org/node/129
www.openwall.com/lists/oss-security/2016/04/30/2
www.openwall.com/lists/oss-security/2016/04/30/4
github.com/quassel/quassel/commit/e678873
security-tracker.debian.org/tracker/CVE-2016-4414