--------------------------------------------------------------------------------
Fedora EPEL Update Notification
FEDORA-EPEL-2017-b4d51971d3
2017-11-27 21:26:31.030833
--------------------------------------------------------------------------------
Name : up-imapproxy
Product : Fedora EPEL 7
Version : 1.2.8
Release : 0.12.20171022svn14722.el7
URL :
http://www.imapproxy.org
Summary : University of Pittsburgh IMAP Proxy
Description :
imapproxy was written to compensate for webmail clients that are
unable to maintain persistent connections to an IMAP server. Most
webmail clients need to log in to an IMAP server for nearly every
single transaction. This behaviour can cause tragic performance
problems on the IMAP server. imapproxy tries to deal with this problem
by leaving server connections open for a short time after a webmail
client logs out. When the webmail client connects again, imapproxy
will determine if there's a cached connection available and reuse it
if possible.
--------------------------------------------------------------------------------
Update Information:
Update to new upstream snapshot to fix SSL bug, patch to fix FTBFS, and update
systemd service file to auto-restart on failure
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1424289 - up-imapproxy: FTBFS in rawhide
https://bugzilla.redhat.com/show_bug.cgi?id=1424289
[ 2 ] Bug #1494182 - Segfault on race conditions. Fixed in imapproxy upstream
https://bugzilla.redhat.com/show_bug.cgi?id=1494182
--------------------------------------------------------------------------------
This update can be installed with the "yum" update programs. Use
su -c 'yum update up-imapproxy' at the command line.
For more information, refer to "YUM", available at
https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/...
All packages are signed with the Fedora EPEL GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------