summaryrefslogtreecommitdiff
path: root/debian
diff options
context:
space:
mode:
authorJulian Andres Klode <julian.klode@canonical.com>2019-01-23 16:50:11 +0100
committerJulian Andres Klode <julian.klode@canonical.com>2019-01-23 16:50:11 +0100
commit4200469bb5a14c4659285917ed30c46a0b15c286 (patch)
tree33f8a84e6939fcce8a105c32e030afdc4ca2e46e /debian
parentd39b6b646cc912314e1e3560ad407980131df92b (diff)
Release 1.8.0~beta11.8.0_beta1
Diffstat (limited to 'debian')
-rw-r--r--debian/changelog39
1 files changed, 39 insertions, 0 deletions
diff --git a/debian/changelog b/debian/changelog
index faa701416..7bf8ca6ed 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,42 @@
+apt (1.8.0~beta1) unstable; urgency=medium
+
+ [ anatoly techtonik ]
+ * README.md: Document that apt is also included
+ * apt.cc: Add "apt info" alias for muscle memory
+
+ [ Jean-Pierre Giraud ]
+ * French manpages translation update (Closes: #915952)
+
+ [ Frans Spiesschaert ]
+ * Dutch manpages translation update (Closes: #916358)
+
+ [ Julian Andres Klode ]
+ * cache hash: Use sse4.2 CRC32c on x86-64 where available
+ * configuration: Compare size first during lookup
+ * debListParser: Avoid native arch lookup in ParseDepends
+ * hash32: Tighten to multiversion to x86-64 ELF and use uint32_t
+ * apt-mark: Introduce minimize-manual
+ * doc/apt-verbatim.ent: Point ubuntu-codename to disco (LP: #1812696)
+ * CI: Use debian:buster as test base image
+ * doc/apt-verbatim.ent: Debian buster is stable
+ * SECURITY UPDATE: content injection in http method (CVE-2019-3462)
+ (LP: #1812353)
+ * debian/control: Drop libcurl4-gnutls-dev build dependency
+
+ [ Mo Zhou ]
+ * zh_CN.po: Update Simplified Chinese programs translation.
+
+ [ Khem Raj ]
+ * Remove `register` keyword
+
+ [ Vasya Novikov ]
+ * bash completion: add keys
+
+ [ David Kalnischkies ]
+ * Communicate back which key(s) were used for signing
+
+ -- Julian Andres Klode <jak@debian.org> Wed, 23 Jan 2019 16:49:34 +0100
+
apt (1.8.0~alpha3.1) unstable; urgency=emergency
* SECURITY UPDATE: content injection in http method (CVE-2019-3462)