diff options
author | Julian Andres Klode <julian.klode@canonical.com> | 2019-01-23 16:50:11 +0100 |
---|---|---|
committer | Julian Andres Klode <julian.klode@canonical.com> | 2019-01-23 16:50:11 +0100 |
commit | 4200469bb5a14c4659285917ed30c46a0b15c286 (patch) | |
tree | 33f8a84e6939fcce8a105c32e030afdc4ca2e46e /debian | |
parent | d39b6b646cc912314e1e3560ad407980131df92b (diff) |
Release 1.8.0~beta11.8.0_beta1
Diffstat (limited to 'debian')
-rw-r--r-- | debian/changelog | 39 |
1 files changed, 39 insertions, 0 deletions
diff --git a/debian/changelog b/debian/changelog index faa701416..7bf8ca6ed 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,42 @@ +apt (1.8.0~beta1) unstable; urgency=medium + + [ anatoly techtonik ] + * README.md: Document that apt is also included + * apt.cc: Add "apt info" alias for muscle memory + + [ Jean-Pierre Giraud ] + * French manpages translation update (Closes: #915952) + + [ Frans Spiesschaert ] + * Dutch manpages translation update (Closes: #916358) + + [ Julian Andres Klode ] + * cache hash: Use sse4.2 CRC32c on x86-64 where available + * configuration: Compare size first during lookup + * debListParser: Avoid native arch lookup in ParseDepends + * hash32: Tighten to multiversion to x86-64 ELF and use uint32_t + * apt-mark: Introduce minimize-manual + * doc/apt-verbatim.ent: Point ubuntu-codename to disco (LP: #1812696) + * CI: Use debian:buster as test base image + * doc/apt-verbatim.ent: Debian buster is stable + * SECURITY UPDATE: content injection in http method (CVE-2019-3462) + (LP: #1812353) + * debian/control: Drop libcurl4-gnutls-dev build dependency + + [ Mo Zhou ] + * zh_CN.po: Update Simplified Chinese programs translation. + + [ Khem Raj ] + * Remove `register` keyword + + [ Vasya Novikov ] + * bash completion: add keys + + [ David Kalnischkies ] + * Communicate back which key(s) were used for signing + + -- Julian Andres Klode <jak@debian.org> Wed, 23 Jan 2019 16:49:34 +0100 + apt (1.8.0~alpha3.1) unstable; urgency=emergency * SECURITY UPDATE: content injection in http method (CVE-2019-3462) |