Modular, Secure, and Well Designed IRC Client
Irssi is a modular IRC client for UNIX that currently only has a text
mode user interface. However, 80-90% of the code is not text mode
specific, so other UIs could be created easily. Also, Irssi is not
really even IRC specific anymore. There are already working SILC and
ICB modules available. Support for other protocols, like ICQ and
Jabber, could be added some day, too.
It is the code that separates Irssi from ircII, BitchX, epic, and the
rest of the text clients. It is not using the ircII code.
- Developed at server:irc
- Sources inherited from project openSUSE:Factory
-
3
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Backports:SLE-15-SP4:FactoryCandidates/irssi && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
irssi-0.8.15_ssl_proxy.patch | 0000000997 997 Bytes | |
irssi-0.8.16_missing_prototype_warnings.patch | 0000000706 706 Bytes | |
irssi-0.8.20.tar.xz | 0001007252 984 KB | |
irssi-0.8.20.tar.xz.asc | 0000000163 163 Bytes | |
irssi-rpmlintrc | 0000000123 123 Bytes | |
irssi.changes | 0000032693 31.9 KB | |
irssi.desktop | 0000000179 179 Bytes | |
irssi.keyring | 0000002630 2.57 KB | |
irssi.png | 0000003237 3.16 KB | |
irssi.spec | 0000004853 4.74 KB |
Revision 36 (latest revision is 70)
Dominique Leuenberger (dimstar_suse)
accepted
request 429372
from
Marcus Meissner (msmeissn)
(revision 36)
- Update to version 0.8.20 - Correct the name of an emitted sasl signal (#484) - Correct the prototype for the 'message private' signal (#515) - Corrections in away and hilight help text (#477, #518) - /squery and /servlist commands have been restored. - Where Irssi would previously only report "System error" on connect, it will now try harder to retrieve the system error message. - Fixed issue with +channels not working properly (#533) - Fixed crash in optchan when item has no server (#485) - Fixed random remote crash in the nicklist handling (#529) - Fixed remote crash due to incorrect bounds checking on formats, reported by Gabriel Campana and Adrien Guinet from Quarkslab. (CVE-2016-7044, CVE-2016-7045, bsc#999199) (forwarded request 429371 from msmeissn)
Comments 0