Merge ~emitorino/review-tools:fix_updates_available_wrong_body_for_kernel into review-tools:master

Proposed by Emilia Torino
Status: Merged
Merged at revision: fa533672c60121c95f56078c756755efb8c6770e
Proposed branch: ~emitorino/review-tools:fix_updates_available_wrong_body_for_kernel
Merge into: review-tools:master
Diff against target: 19647 lines (+19129/-72)
7 files modified
reviewtools/available.py (+54/-16)
reviewtools/tests/test_available.py (+54/-5)
reviewtools/tests/test_store.py (+17/-17)
tests/test-store-kernel.db (+1/-1)
tests/test-updates-available.sh (+73/-15)
tests/test-updates-available.sh.expected (+666/-18)
tests/test-usn-kernel-and-build-pkgs.db (+18264/-0)
Reviewer Review Type Date Requested Status
Jamie Strandboge (community) Approve
Review via email: mp+394901@code.launchpad.net

Description of the change

ea9bf32:

- available.py: consider body and subject email updates depending on USN containing kernel updates only; kernel and build pkgs updates or build pkgs only updates.
- test_available.py: add extra unit tests and fix typo in test-usn-unittest-build-pgks.db (note: pgks)
- test_store.py: fix typo in test-usn-unittest-build-pgks.db
- test-store-kernel.db: Add snapcraft-version to manifest (so snapcraft is added to fake part)
- test-updates-available.sh: Add several tests. fix typo in test-usn-unittest-build-pgks.db
- test-updates-available.sh.expected: Add several expected outputs based on new tests. fix typo in test-usn-unittest-build-pgks.db
- tests: Add new test-usn-kernel-and-build-pkgs.db and fix typo in file /test-usn-unittest-build-pgks-only.db

354e540:
- available.py: moving flags related to report containing build or staged packages to section which checks if secnot not in seen db. Setting report_contains_build_pkgs accordingly (initial impl always returned False)
- test_available.py: add extra unit tests
- test-updates-available.sh: Add new tests considering seen-db
- test-updates-available.sh.expected: Add expected outputs based on new tests.

To post a comment you must log in.
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Thanks for the MP! Please see inline.

review: Needs Fixing
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Can you split this into a separate MP:

354e540:
- available.py: moving flags related to report containing build or staged packages to section which checks if secnot not in seen db. Setting report_contains_build_pkgs accordingly (initial impl always returned False)
- test_available.py: add extra unit tests
- test-updates-available.sh: Add new tests considering seen-db
- test-updates-available.sh.expected: Add expected outputs based on new tests.

review: Needs Fixing
Revision history for this message
Emilia Torino (emitorino) wrote :

As suggested, fixing here the issues for https://bugs.launchpad.net/review-tools/+bug/1906831 only. Will create another MP based on this for https://bugs.launchpad.net/review-tools/+bug/1906827. Please find inline comments/answers. Thanks!

Revision history for this message
Jamie Strandboge (jdstrand) :
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

Approving as is, but if you want to incorporate the comment changes before committing, that is fine.

review: Approve
Revision history for this message
Emilia Torino (emitorino) wrote :

> Approving as is, but if you want to incorporate the comment changes before
> committing, that is fine.

Please find my answer pointing to the comment update in the previous commit. I am not merging until you confirm in case there are some changes not reviewed. Thanks!

Revision history for this message
Emilia Torino (emitorino) :
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

a74bd26 has a typo in an added comment. Please fix and feel free to merge.

As for https://code.launchpad.net/~emitorino/review-tools/+git/review-tools/+merge/394901/comments/1039503, see inline; I was talking about your MP comment describing the change, not the committed change. The MP IME doesn't depend on addressing the MP comment so feel free to commit after fixing the above.

review: Approve

Preview Diff

[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
1diff --git a/reviewtools/available.py b/reviewtools/available.py
2index 72fb164..b21e655 100644
3--- a/reviewtools/available.py
4+++ b/reviewtools/available.py
5@@ -39,6 +39,16 @@ from reviewtools.usn import read_usn_db
6
7 email_update_required_text = """A scan of this snap shows that it was built with packages from the Ubuntu
8 archive that have since received security updates. """
9+email_additional_build_pkgs_text = """In addition, the following lists new USNs for affected build packages in
10+each snap revision:
11+%s
12+"""
13+email_kernel_update_required_text = """A scan of this snap shows that it was built using sources based on a kernel
14+from the Ubuntu archive that has since received security updates. The
15+following lists new USNs for the Ubuntu kernel that the snap is based on in
16+each snap revision:
17+%s
18+"""
19 email_thanks_and_references_text = """
20
21 Thank you for your snap and for attending to this matter.
22@@ -53,6 +63,10 @@ good time to review it for any needed updates."""
23 + email_thanks_and_references_text
24 )
25
26+email_rebuild_kernel_snap_text = """Updating the snap's git tree, adjusting the version in the snapcraft.yaml
27+to match that of the Ubuntu kernel this snap is based on and rebuilding the
28+snap should pull in the new security updates and resolve this."""
29+
30 email_templates = {
31 "default": (
32 email_update_required_text
33@@ -75,21 +89,28 @@ USNs for affected build packages in each snap revision:
34 + """The following lists new
35 USNs for affected binary packages in each snap revision:
36 %s
37-In addition, the following lists new USNs for affected build packages in
38-each snap revision:
39-%s
40 """
41+ + email_additional_build_pkgs_text
42 + email_rebuild_snap_text
43 ),
44 "kernel": (
45- """A scan of this snap shows that it was built using sources based on a kernel
46-from the Ubuntu archive that has since received security updates. The
47-following lists new USNs for the Ubuntu kernel that the snap is based on in
48-each snap revision:
49+ email_kernel_update_required_text
50+ + email_rebuild_kernel_snap_text
51+ + email_thanks_and_references_text
52+ ),
53+ "kernel-build-pkgs-only": (
54+ email_update_required_text
55+ + """The following lists new
56+USNs for affected build packages in each snap revision:
57 %s
58-Updating the snap's git tree, adjusting the version in the snapcraft.yaml
59-to match that of the Ubuntu kernel this snap is based on and rebuilding the
60-snap should pull in the new security updates and resolve this."""
61+"""
62+ + email_rebuild_kernel_snap_text
63+ + email_thanks_and_references_text
64+ ),
65+ "kernel-and-build-pkgs": (
66+ email_kernel_update_required_text
67+ + email_additional_build_pkgs_text
68+ + email_rebuild_kernel_snap_text
69 + email_thanks_and_references_text
70 ),
71 }
72@@ -190,15 +211,32 @@ def _secnot_report_for_pkg(pkg_db, seen_db):
73 reference_urls.sort()
74 template = "default"
75 if "snap_type" in pkg_db and pkg_db["snap_type"] == "kernel":
76- # Since we are not fully supporting notifications for build-packages
77- # just yet, is the standard kernel template that omits them for now.
78 # TODO: update when fully support build-packages
79- subj = "%s built from outdated Ubuntu kernel" % pkgname
80- template = "kernel"
81+ if report_contains_stage_pkgs and report_contains_build_pkgs:
82+ subj = (
83+ "%s built from outdated Ubuntu kernel and with outdated Ubuntu packages"
84+ % pkgname
85+ )
86+ body = email_templates["kernel-and-build-pkgs"] % (
87+ stage_pkgs_report,
88+ build_pkgs_report,
89+ "\n * ".join(reference_urls),
90+ )
91+ elif report_contains_stage_pkgs:
92+ subj = "%s built from outdated Ubuntu kernel" % pkgname
93+ body = email_templates["kernel"] % (
94+ stage_pkgs_report,
95+ "\n * ".join(reference_urls),
96+ )
97+ elif report_contains_build_pkgs:
98+ subj = "%s was built with outdated Ubuntu packages" % pkgname
99+ body = email_templates["kernel-build-pkgs-only"] % (
100+ build_pkgs_report,
101+ "\n * ".join(reference_urls),
102+ )
103 return (
104 subj,
105- email_templates[template]
106- % (stage_pkgs_report, "\n * ".join(reference_urls)),
107+ body,
108 report_contains_stage_pkgs,
109 False,
110 )
111diff --git a/reviewtools/tests/test_available.py b/reviewtools/tests/test_available.py
112index e681d86..4954730 100644
113--- a/reviewtools/tests/test_available.py
114+++ b/reviewtools/tests/test_available.py
115@@ -46,7 +46,7 @@ class TestAvailable(TestCase):
116
117 def test_check__secnot_report_for_pkg_with_build_and_stage_pkgs(self):
118 """Test _secnot_report_for_pkg() - build and stage packages"""
119- secnot_db = usn.read_usn_db("./tests/test-usn-unittest-build-pgks.db")
120+ secnot_db = usn.read_usn_db("./tests/test-usn-unittest-build-pkgs.db")
121 errors = {}
122 pkg_db = store.get_pkg_revisions(self.store_db[0], secnot_db, errors)
123 self.assertEqual(len(errors), 0)
124@@ -123,7 +123,7 @@ Revision r16 (i386; channels: edge)
125
126 def test_check__secnot_report_for_pkg_with_build_pkgs_only(self):
127 """Test _secnot_report_for_pkg() - only build packages"""
128- secnot_db = usn.read_usn_db("./tests/test-usn-unittest-build-pgks-only.db")
129+ secnot_db = usn.read_usn_db("./tests/test-usn-unittest-build-pkgs-only.db")
130 errors = {}
131 pkg_db = store.get_pkg_revisions(self.store_db[0], secnot_db, errors)
132 self.assertEqual(len(errors), 0)
133@@ -413,7 +413,7 @@ Revision r12 (i386; channels: candidate, beta)
134
135 def test_check__email_report_for_pkg_with_staged_and_build_pkgs(self):
136 """Test _email_report_for_pkg() - with staged and build_pks"""
137- secnot_db = usn.read_usn_db("./tests/test-usn-unittest-build-pgks.db")
138+ secnot_db = usn.read_usn_db("./tests/test-usn-unittest-build-pkgs.db")
139 errors = {}
140 pkg_db = store.get_pkg_revisions(self.store_db[0], secnot_db, errors)
141 (to_addr, subj, body) = available._email_report_for_pkg(pkg_db, {})
142@@ -423,7 +423,7 @@ Revision r12 (i386; channels: candidate, beta)
143
144 def test_check__email_report_for_pkg_with_and_build_pkgs_only(self):
145 """Test _email_report_for_pkg() - with staged and build_pks"""
146- secnot_db = usn.read_usn_db("./tests/test-usn-unittest-build-pgks-only.db")
147+ secnot_db = usn.read_usn_db("./tests/test-usn-unittest-build-pkgs-only.db")
148 errors = {}
149 pkg_db = store.get_pkg_revisions(self.store_db[0], secnot_db, errors)
150 (to_addr, subj, body) = available._email_report_for_pkg(pkg_db, {})
151@@ -530,7 +530,7 @@ Revision r12 (i386; channels: candidate, beta)
152
153 def test_check_scan_snap_with_cves(self):
154 """Test scan_snap() with cves"""
155- secnot_fn = "./tests/test-usn-unittest-build-pgks.db"
156+ secnot_fn = "./tests/test-usn-unittest-build-pkgs.db"
157 snap_fn = (
158 "./tests/test-snapcraft-manifest-snapcraft-version-needed_0_amd64.snap"
159 )
160@@ -670,6 +670,8 @@ Revision r12 (i386; channels: candidate, beta)
161 for eml in ["foo@example.com"]:
162 self.assertTrue(eml in to_addr)
163 self.assertTrue("using sources based on a kernel" in body)
164+ self.assertTrue("Updating the snap's git tree" in body)
165+ self.assertFalse("Simply rebuilding the snap" in body)
166 self.assertTrue("linux-image-generic" in body)
167 for line in body.splitlines():
168 # text width of emails should not exceed 75
169@@ -679,6 +681,53 @@ Revision r12 (i386; channels: candidate, beta)
170 for sn in ["3848-1", "3879-1"]:
171 self.assertTrue(sn in body)
172
173+ def test_check_scan_store_kernel_and_build_pkg_update_only(self):
174+ """Test scan_store() - kernel snap and build pkg update"""
175+ secnot_fn = "./tests/test-usn-unittest-build-pkgs-only.db"
176+ store_fn = "./tests/test-store-kernel.db"
177+ (sent, errors) = available.scan_store(secnot_fn, store_fn, None, None)
178+ self.assertEqual(len(errors), 0)
179+ self.assertEqual(len(sent), 1)
180+ (to_addr, subj, body) = sent[0]
181+ for eml in ["foo@example.com"]:
182+ self.assertTrue(eml in to_addr)
183+ self.assertFalse("using sources based on a kernel" in body)
184+ self.assertTrue("Updating the snap's git tree" in body)
185+ self.assertFalse("Simply rebuilding the snap" in body)
186+ self.assertTrue("snapcraft" in body)
187+ for line in body.splitlines():
188+ # text width of emails should not exceed 75
189+ self.assertTrue(len(line) <= 75)
190+ self.assertEqual(
191+ "linux-generic-bbb was built with outdated Ubuntu packages", subj
192+ )
193+ self.assertTrue("USN-5501-1" in body)
194+
195+ def test_check_scan_store_kernel_and_build_pkg_updates(self):
196+ """Test scan_store() - kernel snap and build pkg update"""
197+ secnot_fn = "./tests/test-usn-kernel-and-build-pkgs.db"
198+ store_fn = "./tests/test-store-kernel.db"
199+ (sent, errors) = available.scan_store(secnot_fn, store_fn, None, None)
200+ self.assertEqual(len(errors), 0)
201+ self.assertEqual(len(sent), 1)
202+ (to_addr, subj, body) = sent[0]
203+ for eml in ["foo@example.com"]:
204+ self.assertTrue(eml in to_addr)
205+ self.assertTrue("using sources based on a kernel" in body)
206+ self.assertTrue("Updating the snap's git tree" in body)
207+ self.assertFalse("Simply rebuilding the snap" in body)
208+ self.assertTrue("snapcraft" in body)
209+ self.assertTrue("linux-image-generic" in body)
210+ for line in body.splitlines():
211+ # text width of emails should not exceed 75
212+ self.assertTrue(len(line) <= 75)
213+ self.assertEqual(
214+ "linux-generic-bbb built from outdated Ubuntu kernel and with outdated Ubuntu packages",
215+ subj,
216+ )
217+ for sn in ["3848-1", "3879-1", "USN-5501-1"]:
218+ self.assertTrue(sn in body)
219+
220 def test_check_scan_store_lp1841848_allbinaries(self):
221 """Test scan_store() - lp1841848 (allbinaries)"""
222 secnot_fn = "./tests/test-usn-unittest-lp1841848.db"
223diff --git a/reviewtools/tests/test_store.py b/reviewtools/tests/test_store.py
224index 4b04141..2e8740c 100644
225--- a/reviewtools/tests/test_store.py
226+++ b/reviewtools/tests/test_store.py
227@@ -283,7 +283,7 @@ class TestStore(TestCase):
228 m["parts"] = None
229 m["snapcraft-version"] = "1.1.1"
230 self.store_db[0]["revisions"][i]["manifest_yaml"] = yaml.dump(m)
231- secnot_db = usn.read_usn_db("./tests/test-usn-unittest-build-pgks.db")
232+ secnot_db = usn.read_usn_db("./tests/test-usn-unittest-build-pkgs.db")
233 errors = {}
234 pkg_db = store.get_pkg_revisions(self.store_db[0], secnot_db, errors)
235 # empty parts has no security notices
236@@ -383,7 +383,7 @@ class TestStore(TestCase):
237 m["primed-stage-packages"] = None
238 m["snapcraft-version"] = "1.1.1"
239 self.store_db[0]["revisions"][i]["manifest_yaml"] = yaml.dump(m)
240- secnot_db = usn.read_usn_db("./tests/test-usn-unittest-build-pgks.db")
241+ secnot_db = usn.read_usn_db("./tests/test-usn-unittest-build-pkgs.db")
242 errors = {}
243 pkg_db = store.get_pkg_revisions(self.store_db[0], secnot_db, errors)
244 for rev in pkg_db["revisions"]:
245@@ -424,7 +424,7 @@ class TestStore(TestCase):
246 else:
247 m["snapcraft-version"] = snapcraft_version
248 self.store_db[0]["revisions"][i]["manifest_yaml"] = yaml.dump(m)
249- secnot_db = usn.read_usn_db("./tests/test-usn-unittest-build-pgks.db")
250+ secnot_db = usn.read_usn_db("./tests/test-usn-unittest-build-pkgs.db")
251 errors = {}
252 pkg_db = store.get_pkg_revisions(self.store_db[0], secnot_db, errors)
253 # empty parts/stage-packages has no security notices
254@@ -736,7 +736,7 @@ class TestStore(TestCase):
255 for sec_not_for_build_packages in has_secnot_for_build_packages:
256 if sec_not_for_build_packages:
257 secnot_db = usn.read_usn_db(
258- "./tests/test-usn-unittest-build-pgks.db"
259+ "./tests/test-usn-unittest-build-pkgs.db"
260 )
261 res = store.get_secnots_for_manifest(m, secnot_db)
262 else:
263@@ -788,7 +788,7 @@ class TestStore(TestCase):
264 for sec_not_for_build_packages in has_secnot_for_build_packages:
265 if sec_not_for_build_packages:
266 secnot_db = usn.read_usn_db(
267- "./tests/test-usn-unittest-build-pgks.db"
268+ "./tests/test-usn-unittest-build-pkgs.db"
269 )
270 res = store.get_secnots_for_manifest(m, secnot_db)
271 else:
272@@ -832,7 +832,7 @@ class TestStore(TestCase):
273 for sec_not_for_build_packages in has_secnot_for_build_packages:
274 if sec_not_for_build_packages:
275 secnot_db = usn.read_usn_db(
276- "./tests/test-usn-unittest-build-pgks.db"
277+ "./tests/test-usn-unittest-build-pkgs.db"
278 )
279 res = store.get_secnots_for_manifest(m, secnot_db)
280 else:
281@@ -884,7 +884,7 @@ class TestStore(TestCase):
282 for sec_not_for_build_packages in has_secnot_for_build_packages:
283 if sec_not_for_build_packages:
284 secnot_db = usn.read_usn_db(
285- "./tests/test-usn-unittest-build-pgks.db"
286+ "./tests/test-usn-unittest-build-pkgs.db"
287 )
288 res = store.get_secnots_for_manifest(m, secnot_db)
289 else:
290@@ -1039,7 +1039,7 @@ class TestStore(TestCase):
291 for sec_not_for_build_packages in has_secnot_for_build_packages:
292 if sec_not_for_build_packages:
293 secnot_db = usn.read_usn_db(
294- "./tests/test-usn-unittest-build-pgks.db"
295+ "./tests/test-usn-unittest-build-pkgs.db"
296 )
297 res = store.get_secnots_for_manifest(m, secnot_db)
298 else:
299@@ -1086,7 +1086,7 @@ class TestStore(TestCase):
300 for sec_not_for_build_packages in has_secnot_for_build_packages:
301 if sec_not_for_build_packages:
302 secnot_db = usn.read_usn_db(
303- "./tests/test-usn-unittest-build-pgks.db"
304+ "./tests/test-usn-unittest-build-pkgs.db"
305 )
306 res = store.get_secnots_for_manifest(m, secnot_db)
307 else:
308@@ -1127,7 +1127,7 @@ class TestStore(TestCase):
309 for sec_not_for_build_packages in has_secnot_for_build_packages:
310 if sec_not_for_build_packages:
311 secnot_db = usn.read_usn_db(
312- "./tests/test-usn-unittest-build-pgks.db"
313+ "./tests/test-usn-unittest-build-pkgs.db"
314 )
315 res = store.get_secnots_for_manifest(m, secnot_db)
316 else:
317@@ -1166,7 +1166,7 @@ class TestStore(TestCase):
318 for sec_not_for_build_packages in has_secnot_for_build_packages:
319 if sec_not_for_build_packages:
320 secnot_db = usn.read_usn_db(
321- "./tests/test-usn-unittest-build-pgks.db"
322+ "./tests/test-usn-unittest-build-pkgs.db"
323 )
324 res = store.get_secnots_for_manifest(m, secnot_db, with_cves=True)
325 else:
326@@ -1212,7 +1212,7 @@ class TestStore(TestCase):
327 for sec_not_for_build_packages in has_secnot_for_build_packages:
328 if sec_not_for_build_packages:
329 secnot_db = usn.read_usn_db(
330- "./tests/test-usn-unittest-build-pgks.db"
331+ "./tests/test-usn-unittest-build-pkgs.db"
332 )
333 res = store.get_secnots_for_manifest(m, secnot_db, with_cves=True)
334 else:
335@@ -1260,7 +1260,7 @@ class TestStore(TestCase):
336 for sec_not_for_build_packages in has_secnot_for_build_packages:
337 if sec_not_for_build_packages:
338 secnot_db = usn.read_usn_db(
339- "./tests/test-usn-unittest-build-pgks.db"
340+ "./tests/test-usn-unittest-build-pkgs.db"
341 )
342 res = store.get_secnots_for_manifest(m, secnot_db, with_cves=True)
343 else:
344@@ -1329,7 +1329,7 @@ class TestStore(TestCase):
345 for sec_not_for_build_packages in has_secnot_for_build_packages:
346 if sec_not_for_build_packages:
347 secnot_db = usn.read_usn_db(
348- "./tests/test-usn-unittest-build-pgks.db"
349+ "./tests/test-usn-unittest-build-pkgs.db"
350 )
351 res = store.get_secnots_for_manifest(m, secnot_db, with_cves=True)
352 else:
353@@ -1395,7 +1395,7 @@ class TestStore(TestCase):
354 for sec_not_for_build_packages in has_secnot_for_build_packages:
355 if sec_not_for_build_packages:
356 secnot_db = usn.read_usn_db(
357- "./tests/test-usn-unittest-build-pgks.db"
358+ "./tests/test-usn-unittest-build-pkgs.db"
359 )
360 res = store.get_secnots_for_manifest(m, secnot_db)
361 else:
362@@ -1449,7 +1449,7 @@ class TestStore(TestCase):
363 for sec_not_for_build_packages in has_secnot_for_build_packages:
364 if sec_not_for_build_packages:
365 secnot_db = usn.read_usn_db(
366- "./tests/test-usn-unittest-build-pgks.db"
367+ "./tests/test-usn-unittest-build-pkgs.db"
368 )
369 res = store.get_secnots_for_manifest(m, secnot_db)
370 else:
371@@ -1504,7 +1504,7 @@ class TestStore(TestCase):
372 for sec_not_for_build_packages in has_secnot_for_build_packages:
373 if sec_not_for_build_packages:
374 secnot_db = usn.read_usn_db(
375- "./tests/test-usn-unittest-build-pgks.db"
376+ "./tests/test-usn-unittest-build-pkgs.db"
377 )
378 res = store.get_secnots_for_manifest(m, secnot_db)
379 else:
380diff --git a/tests/test-store-kernel.db b/tests/test-store-kernel.db
381index 7dec9b3..612ae28 100644
382--- a/tests/test-store-kernel.db
383+++ b/tests/test-store-kernel.db
384@@ -11,7 +11,7 @@
385 "stable",
386 "beta"
387 ],
388- "manifest_yaml": "name: linux-generic-bbb\nversion: 4.4.0-140-1\nsummary: foo\ndescription: foo\nconfinement: strict\ntype: kernel\napps:\n foo:\n command: bar\nparts:\n launcher:\n build-packages: []\n installed-packages: []\n installed-snaps: []\n plugin: dump\n prime: []\n stage: []\n stage-packages: []\n uname: 'Linux 4.4.0-140-generic #166-Ubuntu SMP Wed Nov 14 20:10:44 UTC 2018 armv7l\n armv7l armv7l GNU/Linux'\ngrade: stable\narchitectures:\n- armhf\nbuild-packages: []\nbuild-snaps: []\n",
389+ "manifest_yaml": "name: linux-generic-bbb\nsnapcraft-version: '2.3'\nversion: 4.4.0-140-1\nsummary: foo\ndescription: foo\nconfinement: strict\ntype: kernel\napps:\n foo:\n command: bar\nparts:\n launcher:\n build-packages: []\n installed-packages: []\n installed-snaps: []\n plugin: dump\n prime: []\n stage: []\n stage-packages: []\n uname: 'Linux 4.4.0-140-generic #166-Ubuntu SMP Wed Nov 14 20:10:44 UTC 2018 armv7l\n armv7l armv7l GNU/Linux'\ngrade: stable\narchitectures:\n- armhf\nbuild-packages: []\nbuild-snaps: []\n",
390 "version": "4.4.0-140-1",
391 "architectures": [
392 "armhf"
393diff --git a/tests/test-updates-available.sh b/tests/test-updates-available.sh
394index 2d01dcf..ef64318 100755
395--- a/tests/test-updates-available.sh
396+++ b/tests/test-updates-available.sh
397@@ -100,11 +100,34 @@ run "$tmp_seen" test-usn-os-release.db test-store-os-release.db
398 run "$tmp_seen" test-usn-os-release.db test-store-os-release.db
399
400 # should show 3848-1 and 3879-1
401+# test-usn-kernel.db contains only USNs for kernel
402 comment "= Test --seen-db updated for linux-generic-bbb ="
403 reset_seen "$tmp_seen"
404 run "$tmp_seen" test-usn-kernel.db test-store-kernel.db
405 run "$tmp_seen" test-usn-kernel.db test-store-kernel.db
406
407+# should show 3848-1, 3879-1 and 5501-1
408+# test-usn-kernel-and-build-pkgs.db contains USNs for kernel and build pkgs
409+comment "= Test --seen-db updated for linux-generic-bbb and build-pkgs ="
410+reset_seen "$tmp_seen"
411+run "$tmp_seen" test-usn-kernel-and-build-pkgs.db test-store-kernel.db
412+run "$tmp_seen" test-usn-kernel-and-build-pkgs.db test-store-kernel.db
413+
414+# should show 5501-1
415+# test-usn-unittest-build-pkgs-only.db contains only USNs for build pkgs
416+comment "= Test --seen-db updated for build-pkgs only ="
417+reset_seen "$tmp_seen"
418+run "$tmp_seen" test-usn-unittest-build-pkgs-only.db test-store-kernel.db
419+run "$tmp_seen" test-usn-unittest-build-pkgs-only.db test-store-kernel.db
420+
421+# should show 5501-1
422+# test-usn-unittest-build-pkgs.db contains USNs for staged and build pkgs, no
423+# kernel USNs at all
424+comment "= Test --seen-db updated for build-pkgs and staged packages ="
425+reset_seen "$tmp_seen"
426+run "$tmp_seen" test-usn-unittest-build-pkgs.db test-store-kernel.db
427+run "$tmp_seen" test-usn-unittest-build-pkgs.db test-store-kernel.db
428+
429 # should show nothing with release that doesn't exist and release that isn't
430 # in the usn db yet
431 comment "= Test unkown release and missing usn release ="
432@@ -134,9 +157,22 @@ PYTHONPATH=./ ./bin/snap-updates-available --with-cves --usn-db='./tests/test-us
433 echo "" | tee -a "$tmp"
434
435 for i in gke-kernel_4.15.0-1027.28~16.04.1_amd64.snap linux-generic-bbb_4.4.0-140-1_armhf.snap pc-kernel_4.15.0-44.46_i386.snap pc-kernel_4.4.0-141.167_amd64.snap ; do
436- echo "Running: snap-updates-available --usn-db='./tests/test-usn-kernel.db' --snap='./tests/$i'" | tee -a "$tmp"
437+ # kernel USNs only
438+ echo "Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-kernel.db' --snap='./tests/$i'" | tee -a "$tmp"
439 PYTHONPATH=./ ./bin/snap-updates-available --with-cves --usn-db='./tests/test-usn-kernel.db' --snap="./tests/$i" 2>&1 | tee -a "$tmp"
440 echo "" | tee -a "$tmp"
441+ # kernel and build-packages USNs
442+ echo "Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-kernel-and-build-pkgs.db' --snap='./tests/$i'" | tee -a "$tmp"
443+ PYTHONPATH=./ ./bin/snap-updates-available --with-cves --usn-db='./tests/test-usn-kernel-and-build-pkgs.db' --snap="./tests/$i" 2>&1 | tee -a "$tmp"
444+ echo "" | tee -a "$tmp"
445+ # build-packages USNs only
446+ echo "Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-unittest-build-pkgs-only.db' --snap='./tests/$i'" | tee -a "$tmp"
447+ PYTHONPATH=./ ./bin/snap-updates-available --with-cves --usn-db='./tests/test-usn-unittest-build-pkgs-only.db' --snap="./tests/$i" 2>&1 | tee -a "$tmp"
448+ echo "" | tee -a "$tmp"
449+ # build-packages and stage-packages USNs - no kernel USN
450+ echo "Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-unittest-build-pkgs.db' --snap='./tests/$i'" | tee -a "$tmp"
451+ PYTHONPATH=./ ./bin/snap-updates-available --with-cves --usn-db='./tests/test-usn-unittest-build-pkgs.db' --snap="./tests/$i" 2>&1 | tee -a "$tmp"
452+ echo "" | tee -a "$tmp"
453 done
454
455 # Test bad store db
456@@ -145,23 +181,23 @@ PYTHONPATH=./ ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-1
457 echo "" | tee -a "$tmp"
458
459 # Test build and staged packages updates
460-echo "Running: ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-build-pgks.db' --store-db='./tests/test-store-unittest-1.db'" | tee -a "$tmp"
461-PYTHONPATH=./ ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-build-pgks.db' --store-db='./tests/test-store-unittest-1.db' 2>&1 | tee -a "$tmp"
462+echo "Running: ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-build-pkgs.db' --store-db='./tests/test-store-unittest-1.db'" | tee -a "$tmp"
463+PYTHONPATH=./ ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-build-pkgs.db' --store-db='./tests/test-store-unittest-1.db' 2>&1 | tee -a "$tmp"
464 echo "" | tee -a "$tmp"
465
466 # Test staged packages updates only - no updates for build packages
467-echo "Running: ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-build-pgks.db' --store-db='./tests/test-store-unittest-2.db'" | tee -a "$tmp"
468-PYTHONPATH=./ ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-build-pgks.db' --store-db='./tests/test-store-unittest-2.db' 2>&1 | tee -a "$tmp"
469+echo "Running: ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-build-pkgs.db' --store-db='./tests/test-store-unittest-2.db'" | tee -a "$tmp"
470+PYTHONPATH=./ ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-build-pkgs.db' --store-db='./tests/test-store-unittest-2.db' 2>&1 | tee -a "$tmp"
471 echo "" | tee -a "$tmp"
472
473 # Test build packages updates only
474-echo "Running: ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-build-pgks-only.db' --store-db='./tests/test-store-unittest-1.db'" | tee -a "$tmp"
475-PYTHONPATH=./ ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-build-pgks-only.db' --store-db='./tests/test-store-unittest-1.db' 2>&1 | tee -a "$tmp"
476+echo "Running: ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-build-pkgs-only.db' --store-db='./tests/test-store-unittest-1.db'" | tee -a "$tmp"
477+PYTHONPATH=./ ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-build-pkgs-only.db' --store-db='./tests/test-store-unittest-1.db' 2>&1 | tee -a "$tmp"
478 echo "" | tee -a "$tmp"
479
480 # Test build packages updates - update override
481-echo "Running: ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-build-pgks.db' --store-db='./tests/test-store-unittest-3.db'" | tee -a "$tmp"
482-PYTHONPATH=./ ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-build-pgks.db' --store-db='./tests/test-store-unittest-3.db' 2>&1 | tee -a "$tmp"
483+echo "Running: ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-build-pkgs.db' --store-db='./tests/test-store-unittest-3.db'" | tee -a "$tmp"
484+PYTHONPATH=./ ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-build-pkgs.db' --store-db='./tests/test-store-unittest-3.db' 2>&1 | tee -a "$tmp"
485 echo "" | tee -a "$tmp"
486
487
488@@ -196,14 +232,14 @@ echo "" | tee -a "$tmp"
489 echo "Running: USNDB='./tests/test-usn-budgie-3.db' snap-check-notices --no-fetch --with-cves ./tests/test-snapcraft-manifest-snapcraft-version_0_amd64.snap" | tee -a "$tmp"
490 PYTHONPATH=./ SNAP=./ SNAP_USER_COMMON=./ USNDB='./tests/test-usn-budgie-3.db' ./bin/snap-check-notices --no-fetch --with-cves "./tests/test-snapcraft-manifest-snapcraft-version_0_amd64.snap" 2>&1 | tee -a "$tmp"
491 echo "" | tee -a "$tmp"
492-echo "Running: USNDB='./tests/test-usn-unittest-build-pgks.db' snap-check-notices --no-fetch --with-cves ./tests/test-snapcraft-manifest-snapcraft-version-needed_0_amd64.snap" | tee -a "$tmp"
493-PYTHONPATH=./ SNAP=./ SNAP_USER_COMMON=./ USNDB='./tests/test-usn-unittest-build-pgks.db' ./bin/snap-check-notices --no-fetch --with-cves "./tests/test-snapcraft-manifest-snapcraft-version-needed_0_amd64.snap" 2>&1 | tee -a "$tmp"
494+echo "Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/test-snapcraft-manifest-snapcraft-version-needed_0_amd64.snap" | tee -a "$tmp"
495+PYTHONPATH=./ SNAP=./ SNAP_USER_COMMON=./ USNDB='./tests/test-usn-unittest-build-pkgs.db' ./bin/snap-check-notices --no-fetch --with-cves "./tests/test-snapcraft-manifest-snapcraft-version-needed_0_amd64.snap" 2>&1 | tee -a "$tmp"
496 echo "" | tee -a "$tmp"
497-echo "Running: USNDB='./tests/test-usn-unittest-build-pgks.db' snap-check-notices --no-fetch --with-cves ./tests/test-snapcraft-manifest-package-in-installed-snaps_0_amd64.snap" | tee -a "$tmp"
498-PYTHONPATH=./ SNAP=./ SNAP_USER_COMMON=./ USNDB='./tests/test-usn-unittest-build-pgks.db' ./bin/snap-check-notices --no-fetch --with-cves "./tests/test-snapcraft-manifest-package-in-installed-snaps_0_amd64.snap" 2>&1 | tee -a "$tmp"
499+echo "Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/test-snapcraft-manifest-package-in-installed-snaps_0_amd64.snap" | tee -a "$tmp"
500+PYTHONPATH=./ SNAP=./ SNAP_USER_COMMON=./ USNDB='./tests/test-usn-unittest-build-pkgs.db' ./bin/snap-check-notices --no-fetch --with-cves "./tests/test-snapcraft-manifest-package-in-installed-snaps_0_amd64.snap" 2>&1 | tee -a "$tmp"
501 echo "" | tee -a "$tmp"
502-echo "Running: USNDB='./tests/test-usn-unittest-build-pgks.db' snap-check-notices --no-fetch --with-cves ./tests/test-snapcraft-manifest-snapcraft-updated_0_amd64.snap" | tee -a "$tmp"
503-PYTHONPATH=./ SNAP=./ SNAP_USER_COMMON=./ USNDB='./tests/test-usn-unittest-build-pgks.db' ./bin/snap-check-notices --no-fetch --with-cves "./tests/test-snapcraft-manifest-snapcraft-updated_0_amd64.snap" 2>&1 | tee -a "$tmp"
504+echo "Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/test-snapcraft-manifest-snapcraft-updated_0_amd64.snap" | tee -a "$tmp"
505+PYTHONPATH=./ SNAP=./ SNAP_USER_COMMON=./ USNDB='./tests/test-usn-unittest-build-pkgs.db' ./bin/snap-check-notices --no-fetch --with-cves "./tests/test-snapcraft-manifest-snapcraft-updated_0_amd64.snap" 2>&1 | tee -a "$tmp"
506 echo "" | tee -a "$tmp"
507
508 ## core
509@@ -216,12 +252,34 @@ echo "" | tee -a "$tmp"
510
511 ## kernel
512 for i in gke-kernel_4.15.0-1027.28~16.04.1_amd64.snap linux-generic-bbb_4.4.0-140-1_armhf.snap pc-kernel_4.15.0-44.46_i386.snap pc-kernel_4.4.0-141.167_amd64.snap gke-kernel_4.15.0-1069.72_amd64.snap; do
513+ # kernel USN only
514 echo "Running: snap-check-notices --no-fetch ./tests/$i" | tee -a "$tmp"
515 PYTHONPATH=./ SNAP=./ SNAP_USER_COMMON=./ USNDB='./tests/test-usn-kernel.db' ./bin/snap-check-notices --no-fetch "./tests/$i" 2>&1 | tee -a "$tmp"
516 echo "" | tee -a "$tmp"
517 echo "Running: snap-check-notices --no-fetch --with-cves ./tests/$i" | tee -a "$tmp"
518 PYTHONPATH=./ SNAP=./ SNAP_USER_COMMON=./ USNDB='./tests/test-usn-kernel.db' ./bin/snap-check-notices --no-fetch --with-cves "./tests/$i" 2>&1 | tee -a "$tmp"
519 echo "" | tee -a "$tmp"
520+ # kernel and build-packages USN
521+ echo "Running: USNDB='./tests/test-usn-kernel-and-build-pkgs.db' snap-check-notices --no-fetch ./tests/$i" | tee -a "$tmp"
522+ PYTHONPATH=./ SNAP=./ SNAP_USER_COMMON=./ USNDB='./tests/test-usn-kernel-and-build-pkgs.db' ./bin/snap-check-notices --no-fetch "./tests/$i" 2>&1 | tee -a "$tmp"
523+ echo "" | tee -a "$tmp"
524+ echo "Running: USNDB='./tests/test-usn-kernel-and-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/$i" | tee -a "$tmp"
525+ PYTHONPATH=./ SNAP=./ SNAP_USER_COMMON=./ USNDB='./tests/test-usn-kernel-and-build-pkgs.db' ./bin/snap-check-notices --no-fetch --with-cves "./tests/$i" 2>&1 | tee -a "$tmp"
526+ echo "" | tee -a "$tmp"
527+ # build-packages and stage-packages USN
528+ echo "Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch ./tests/$i" | tee -a "$tmp"
529+ PYTHONPATH=./ SNAP=./ SNAP_USER_COMMON=./ USNDB='./tests/test-usn-unittest-build-pkgs.db' ./bin/snap-check-notices --no-fetch "./tests/$i" 2>&1 | tee -a "$tmp"
530+ echo "" | tee -a "$tmp"
531+ echo "Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/$i" | tee -a "$tmp"
532+ PYTHONPATH=./ SNAP=./ SNAP_USER_COMMON=./ USNDB='./tests/test-usn-unittest-build-pkgs.db' ./bin/snap-check-notices --no-fetch --with-cves "./tests/$i" 2>&1 | tee -a "$tmp"
533+ echo "" | tee -a "$tmp"
534+ # build-packages USN only
535+ echo "Running: USNDB='./tests/test-usn-unittest-build-pkgs-only.db' snap-check-notices --no-fetch ./tests/$i" | tee -a "$tmp"
536+ PYTHONPATH=./ SNAP=./ SNAP_USER_COMMON=./ USNDB='./tests/test-usn-unittest-build-pkgs-only.db' ./bin/snap-check-notices --no-fetch "./tests/$i" 2>&1 | tee -a "$tmp"
537+ echo "" | tee -a "$tmp"
538+ echo "Running: USNDB='./tests/test-usn-unittest-build-pkgs-only.db' snap-check-notices --no-fetch --with-cves ./tests/$i" | tee -a "$tmp"
539+ PYTHONPATH=./ SNAP=./ SNAP_USER_COMMON=./ USNDB='./tests/test-usn-unittest-build-pkgs-only.db' ./bin/snap-check-notices --no-fetch --with-cves "./tests/$i" 2>&1 | tee -a "$tmp"
540+ echo "" | tee -a "$tmp"
541 done
542
543 ## LP: #1841848
544diff --git a/tests/test-updates-available.sh.expected b/tests/test-updates-available.sh.expected
545index e1ae688..26952cd 100644
546--- a/tests/test-updates-available.sh.expected
547+++ b/tests/test-updates-available.sh.expected
548@@ -420,6 +420,96 @@ References:
549
550 Running: snap-updates-available --seen-db='<tmpfile>' --usn-db='./tests/test-usn-kernel.db' --store-db='./tests/test-store-kernel.db'...
551
552+= Test --seen-db updated for linux-generic-bbb and build-pkgs =
553+Emptying seen.db
554+Running: snap-updates-available --seen-db='<tmpfile>' --usn-db='./tests/test-usn-kernel-and-build-pkgs.db' --store-db='./tests/test-store-kernel.db'...
555+From: Snap Store <noreply@canonical.com>
556+To: foo@example.com
557+Bcc: jamie@canonical.com, alex.murray@canonical.com, emilia.torino@canonical.com
558+Subject: linux-generic-bbb built from outdated Ubuntu kernel and with outdated Ubuntu packages
559+
560+A scan of this snap shows that it was built using sources based on a kernel
561+from the Ubuntu archive that has since received security updates. The
562+following lists new USNs for the Ubuntu kernel that the snap is based on in
563+each snap revision:
564+
565+Revision r12 (armhf; channels: stable, beta)
566+ * linux-image-generic: 3848-1, 3879-1
567+
568+In addition, the following lists new USNs for affected build packages in
569+each snap revision:
570+
571+Revision r12 (armhf; channels: stable, beta)
572+ * snapcraft: 5501-1
573+
574+Updating the snap's git tree, adjusting the version in the snapcraft.yaml
575+to match that of the Ubuntu kernel this snap is based on and rebuilding the
576+snap should pull in the new security updates and resolve this.
577+
578+Thank you for your snap and for attending to this matter.
579+
580+References:
581+ * https://ubuntu.com/security/notices/USN-3848-1/
582+ * https://ubuntu.com/security/notices/USN-3879-1/
583+ * https://ubuntu.com/security/notices/USN-5501-1/
584+
585+
586+Running: snap-updates-available --seen-db='<tmpfile>' --usn-db='./tests/test-usn-kernel-and-build-pkgs.db' --store-db='./tests/test-store-kernel.db'...
587+
588+= Test --seen-db updated for build-pkgs only =
589+Emptying seen.db
590+Running: snap-updates-available --seen-db='<tmpfile>' --usn-db='./tests/test-usn-unittest-build-pkgs-only.db' --store-db='./tests/test-store-kernel.db'...
591+From: Snap Store <noreply@canonical.com>
592+To: foo@example.com
593+Bcc: jamie@canonical.com, alex.murray@canonical.com, emilia.torino@canonical.com
594+Subject: linux-generic-bbb was built with outdated Ubuntu packages
595+
596+A scan of this snap shows that it was built with packages from the Ubuntu
597+archive that have since received security updates. The following lists new
598+USNs for affected build packages in each snap revision:
599+
600+Revision r12 (armhf; channels: stable, beta)
601+ * snapcraft: 5501-1
602+
603+Updating the snap's git tree, adjusting the version in the snapcraft.yaml
604+to match that of the Ubuntu kernel this snap is based on and rebuilding the
605+snap should pull in the new security updates and resolve this.
606+
607+Thank you for your snap and for attending to this matter.
608+
609+References:
610+ * https://ubuntu.com/security/notices/USN-5501-1/
611+
612+
613+Running: snap-updates-available --seen-db='<tmpfile>' --usn-db='./tests/test-usn-unittest-build-pkgs-only.db' --store-db='./tests/test-store-kernel.db'...
614+
615+= Test --seen-db updated for build-pkgs and staged packages =
616+Emptying seen.db
617+Running: snap-updates-available --seen-db='<tmpfile>' --usn-db='./tests/test-usn-unittest-build-pkgs.db' --store-db='./tests/test-store-kernel.db'...
618+From: Snap Store <noreply@canonical.com>
619+To: foo@example.com
620+Bcc: jamie@canonical.com, alex.murray@canonical.com, emilia.torino@canonical.com
621+Subject: linux-generic-bbb was built with outdated Ubuntu packages
622+
623+A scan of this snap shows that it was built with packages from the Ubuntu
624+archive that have since received security updates. The following lists new
625+USNs for affected build packages in each snap revision:
626+
627+Revision r12 (armhf; channels: stable, beta)
628+ * snapcraft: 5501-1
629+
630+Updating the snap's git tree, adjusting the version in the snapcraft.yaml
631+to match that of the Ubuntu kernel this snap is based on and rebuilding the
632+snap should pull in the new security updates and resolve this.
633+
634+Thank you for your snap and for attending to this matter.
635+
636+References:
637+ * https://ubuntu.com/security/notices/USN-5501-1/
638+
639+
640+Running: snap-updates-available --seen-db='<tmpfile>' --usn-db='./tests/test-usn-unittest-build-pkgs.db' --store-db='./tests/test-store-kernel.db'...
641+
642 = Test unkown release and missing usn release =
643 Emptying seen.db
644 Running: snap-updates-available --seen-db='<tmpfile>' --usn-db='./tests/test-usn-os-release-dne.db' --store-db='./tests/test-store-os-release-dne.db'...
645@@ -525,16 +615,67 @@ Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-core-with
646 }
647 }
648
649-Running: snap-updates-available --usn-db='./tests/test-usn-kernel.db' --snap='./tests/gke-kernel_4.15.0-1027.28~16.04.1_amd64.snap'
650+Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-kernel.db' --snap='./tests/gke-kernel_4.15.0-1027.28~16.04.1_amd64.snap'
651+{
652+ "linux-image-gke": {
653+ "4489-1": [
654+ "CVE-2020-14386"
655+ ]
656+ }
657+}
658+
659+Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-kernel-and-build-pkgs.db' --snap='./tests/gke-kernel_4.15.0-1027.28~16.04.1_amd64.snap'
660 {
661 "linux-image-gke": {
662 "4489-1": [
663 "CVE-2020-14386"
664 ]
665+ },
666+ "snapcraft": {
667+ "5501-1": [
668+ "CVE-2020-9999"
669+ ]
670+ }
671+}
672+
673+Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-unittest-build-pkgs-only.db' --snap='./tests/gke-kernel_4.15.0-1027.28~16.04.1_amd64.snap'
674+{
675+ "snapcraft": {
676+ "5501-1": [
677+ "CVE-2020-9999"
678+ ]
679+ }
680+}
681+
682+Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-unittest-build-pkgs.db' --snap='./tests/gke-kernel_4.15.0-1027.28~16.04.1_amd64.snap'
683+{
684+ "snapcraft": {
685+ "5501-1": [
686+ "CVE-2020-9999"
687+ ]
688+ }
689+}
690+
691+Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-kernel.db' --snap='./tests/linux-generic-bbb_4.4.0-140-1_armhf.snap'
692+{
693+ "linux-image-generic": {
694+ "3848-1": [
695+ "CVE-2017-18174",
696+ "CVE-2018-12896",
697+ "CVE-2018-18690",
698+ "CVE-2018-18710"
699+ ],
700+ "3879-1": [
701+ "CVE-2018-10883",
702+ "CVE-2018-16862",
703+ "CVE-2018-19407",
704+ "CVE-2018-19824",
705+ "CVE-2018-20169"
706+ ]
707 }
708 }
709
710-Running: snap-updates-available --usn-db='./tests/test-usn-kernel.db' --snap='./tests/linux-generic-bbb_4.4.0-140-1_armhf.snap'
711+Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-kernel-and-build-pkgs.db' --snap='./tests/linux-generic-bbb_4.4.0-140-1_armhf.snap'
712 {
713 "linux-image-generic": {
714 "3848-1": [
715@@ -550,10 +691,33 @@ Running: snap-updates-available --usn-db='./tests/test-usn-kernel.db' --snap='./
716 "CVE-2018-19824",
717 "CVE-2018-20169"
718 ]
719+ },
720+ "snapcraft": {
721+ "5501-1": [
722+ "CVE-2020-9999"
723+ ]
724+ }
725+}
726+
727+Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-unittest-build-pkgs-only.db' --snap='./tests/linux-generic-bbb_4.4.0-140-1_armhf.snap'
728+{
729+ "snapcraft": {
730+ "5501-1": [
731+ "CVE-2020-9999"
732+ ]
733+ }
734+}
735+
736+Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-unittest-build-pkgs.db' --snap='./tests/linux-generic-bbb_4.4.0-140-1_armhf.snap'
737+{
738+ "snapcraft": {
739+ "5501-1": [
740+ "CVE-2020-9999"
741+ ]
742 }
743 }
744
745-Running: snap-updates-available --usn-db='./tests/test-usn-kernel.db' --snap='./tests/pc-kernel_4.15.0-44.46_i386.snap'
746+Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-kernel.db' --snap='./tests/pc-kernel_4.15.0-44.46_i386.snap'
747 {
748 "linux-image-generic": {
749 "3871-2": [
750@@ -566,7 +730,56 @@ Running: snap-updates-available --usn-db='./tests/test-usn-kernel.db' --snap='./
751 }
752 }
753
754-Running: snap-updates-available --usn-db='./tests/test-usn-kernel.db' --snap='./tests/pc-kernel_4.4.0-141.167_amd64.snap'
755+Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-kernel-and-build-pkgs.db' --snap='./tests/pc-kernel_4.15.0-44.46_i386.snap'
756+{
757+ "linux-image-generic": {
758+ "3871-2": [
759+ "https://launchpad.net/bugs/1813663",
760+ "https://launchpad.net/bugs/1813727"
761+ ],
762+ "4489-1": [
763+ "CVE-2020-14386"
764+ ]
765+ },
766+ "snapcraft": {
767+ "5501-1": [
768+ "CVE-2020-9999"
769+ ]
770+ }
771+}
772+
773+Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-unittest-build-pkgs-only.db' --snap='./tests/pc-kernel_4.15.0-44.46_i386.snap'
774+{
775+ "snapcraft": {
776+ "5501-1": [
777+ "CVE-2020-9999"
778+ ]
779+ }
780+}
781+
782+Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-unittest-build-pkgs.db' --snap='./tests/pc-kernel_4.15.0-44.46_i386.snap'
783+{
784+ "snapcraft": {
785+ "5501-1": [
786+ "CVE-2020-9999"
787+ ]
788+ }
789+}
790+
791+Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-kernel.db' --snap='./tests/pc-kernel_4.4.0-141.167_amd64.snap'
792+{
793+ "linux-image-generic": {
794+ "3879-1": [
795+ "CVE-2018-10883",
796+ "CVE-2018-16862",
797+ "CVE-2018-19407",
798+ "CVE-2018-19824",
799+ "CVE-2018-20169"
800+ ]
801+ }
802+}
803+
804+Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-kernel-and-build-pkgs.db' --snap='./tests/pc-kernel_4.4.0-141.167_amd64.snap'
805 {
806 "linux-image-generic": {
807 "3879-1": [
808@@ -576,6 +789,29 @@ Running: snap-updates-available --usn-db='./tests/test-usn-kernel.db' --snap='./
809 "CVE-2018-19824",
810 "CVE-2018-20169"
811 ]
812+ },
813+ "snapcraft": {
814+ "5501-1": [
815+ "CVE-2020-9999"
816+ ]
817+ }
818+}
819+
820+Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-unittest-build-pkgs-only.db' --snap='./tests/pc-kernel_4.4.0-141.167_amd64.snap'
821+{
822+ "snapcraft": {
823+ "5501-1": [
824+ "CVE-2020-9999"
825+ ]
826+ }
827+}
828+
829+Running: snap-updates-available --with-cves --usn-db='./tests/test-usn-unittest-build-pkgs.db' --snap='./tests/pc-kernel_4.4.0-141.167_amd64.snap'
830+{
831+ "snapcraft": {
832+ "5501-1": [
833+ "CVE-2020-9999"
834+ ]
835 }
836 }
837
838@@ -619,7 +855,7 @@ References:
839 * https://ubuntu.com/security/notices/USN-3606-1/
840
841
842-Running: ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-build-pgks.db' --store-db='./tests/test-store-unittest-1.db'
843+Running: ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-build-pkgs.db' --store-db='./tests/test-store-unittest-1.db'
844 From: Snap Store <noreply@canonical.com>
845 To: olivier.tilloy@canonical.com
846 Bcc: jamie@canonical.com, alex.murray@canonical.com, emilia.torino@canonical.com
847@@ -691,7 +927,7 @@ References:
848 * https://ubuntu.com/security/notices/USN-5501-1/
849
850
851-Running: ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-build-pgks.db' --store-db='./tests/test-store-unittest-2.db'
852+Running: ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-build-pkgs.db' --store-db='./tests/test-store-unittest-2.db'
853 From: Snap Store <noreply@canonical.com>
854 To: olivier.tilloy@canonical.com
855 Bcc: jamie@canonical.com, alex.murray@canonical.com, emilia.torino@canonical.com
856@@ -737,7 +973,7 @@ References:
857 * https://ubuntu.com/security/notices/USN-3606-1/
858
859
860-Running: ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-build-pgks-only.db' --store-db='./tests/test-store-unittest-1.db'
861+Running: ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-build-pkgs-only.db' --store-db='./tests/test-store-unittest-1.db'
862 From: Snap Store <noreply@canonical.com>
863 To: olivier.tilloy@canonical.com
864 Bcc: jamie@canonical.com, alex.murray@canonical.com, emilia.torino@canonical.com
865@@ -775,7 +1011,7 @@ References:
866 * https://ubuntu.com/security/notices/USN-5501-1/
867
868
869-Running: ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-build-pgks.db' --store-db='./tests/test-store-unittest-3.db'
870+Running: ./bin/snap-updates-available --usn-db='./tests/test-usn-unittest-build-pkgs.db' --store-db='./tests/test-store-unittest-3.db'
871 From: Snap Store <noreply@canonical.com>
872 To: olivier.tilloy@canonical.com
873 Bcc: jamie@canonical.com, alex.murray@canonical.com, emilia.torino@canonical.com
874@@ -1012,7 +1248,7 @@ Running: USNDB='./tests/test-usn-budgie-3.db' snap-check-notices --no-fetch --wi
875 }
876 }
877
878-Running: USNDB='./tests/test-usn-unittest-build-pgks.db' snap-check-notices --no-fetch --with-cves ./tests/test-snapcraft-manifest-snapcraft-version-needed_0_amd64.snap
879+Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/test-snapcraft-manifest-snapcraft-version-needed_0_amd64.snap
880 {
881 "test-snapcraft-manifest-snapcraft-version-needed": {
882 "0": {
883@@ -1025,7 +1261,7 @@ Running: USNDB='./tests/test-usn-unittest-build-pgks.db' snap-check-notices --no
884 }
885 }
886
887-Running: USNDB='./tests/test-usn-unittest-build-pgks.db' snap-check-notices --no-fetch --with-cves ./tests/test-snapcraft-manifest-package-in-installed-snaps_0_amd64.snap
888+Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/test-snapcraft-manifest-package-in-installed-snaps_0_amd64.snap
889 {
890 "test-snapcraft-manifest-package-in-installed-snaps": {
891 "0": {
892@@ -1038,7 +1274,7 @@ Running: USNDB='./tests/test-usn-unittest-build-pgks.db' snap-check-notices --no
893 }
894 }
895
896-Running: USNDB='./tests/test-usn-unittest-build-pgks.db' snap-check-notices --no-fetch --with-cves ./tests/test-snapcraft-manifest-snapcraft-updated_0_amd64.snap
897+Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/test-snapcraft-manifest-snapcraft-updated_0_amd64.snap
898 {
899 "test-snapcraft-manifest-snapcraft-updated": {
900 "0": {}
901@@ -1121,6 +1357,86 @@ Running: snap-check-notices --no-fetch --with-cves ./tests/gke-kernel_4.15.0-102
902 }
903 }
904
905+Running: USNDB='./tests/test-usn-kernel-and-build-pkgs.db' snap-check-notices --no-fetch ./tests/gke-kernel_4.15.0-1027.28~16.04.1_amd64.snap
906+{
907+ "gke-kernel": {
908+ "4.15.0-1027.28~16.04.1": {
909+ "linux-image-gke": [
910+ "4489-1"
911+ ],
912+ "snapcraft": [
913+ "5501-1"
914+ ]
915+ }
916+ }
917+}
918+
919+Running: USNDB='./tests/test-usn-kernel-and-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/gke-kernel_4.15.0-1027.28~16.04.1_amd64.snap
920+{
921+ "gke-kernel": {
922+ "4.15.0-1027.28~16.04.1": {
923+ "linux-image-gke": {
924+ "4489-1": [
925+ "CVE-2020-14386"
926+ ]
927+ },
928+ "snapcraft": {
929+ "5501-1": [
930+ "CVE-2020-9999"
931+ ]
932+ }
933+ }
934+ }
935+}
936+
937+Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch ./tests/gke-kernel_4.15.0-1027.28~16.04.1_amd64.snap
938+{
939+ "gke-kernel": {
940+ "4.15.0-1027.28~16.04.1": {
941+ "snapcraft": [
942+ "5501-1"
943+ ]
944+ }
945+ }
946+}
947+
948+Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/gke-kernel_4.15.0-1027.28~16.04.1_amd64.snap
949+{
950+ "gke-kernel": {
951+ "4.15.0-1027.28~16.04.1": {
952+ "snapcraft": {
953+ "5501-1": [
954+ "CVE-2020-9999"
955+ ]
956+ }
957+ }
958+ }
959+}
960+
961+Running: USNDB='./tests/test-usn-unittest-build-pkgs-only.db' snap-check-notices --no-fetch ./tests/gke-kernel_4.15.0-1027.28~16.04.1_amd64.snap
962+{
963+ "gke-kernel": {
964+ "4.15.0-1027.28~16.04.1": {
965+ "snapcraft": [
966+ "5501-1"
967+ ]
968+ }
969+ }
970+}
971+
972+Running: USNDB='./tests/test-usn-unittest-build-pkgs-only.db' snap-check-notices --no-fetch --with-cves ./tests/gke-kernel_4.15.0-1027.28~16.04.1_amd64.snap
973+{
974+ "gke-kernel": {
975+ "4.15.0-1027.28~16.04.1": {
976+ "snapcraft": {
977+ "5501-1": [
978+ "CVE-2020-9999"
979+ ]
980+ }
981+ }
982+ }
983+}
984+
985 Running: snap-check-notices --no-fetch ./tests/linux-generic-bbb_4.4.0-140-1_armhf.snap
986 {
987 "linux-generic-bbb": {
988@@ -1156,21 +1472,144 @@ Running: snap-check-notices --no-fetch --with-cves ./tests/linux-generic-bbb_4.4
989 }
990 }
991
992-Running: snap-check-notices --no-fetch ./tests/pc-kernel_4.15.0-44.46_i386.snap
993+Running: USNDB='./tests/test-usn-kernel-and-build-pkgs.db' snap-check-notices --no-fetch ./tests/linux-generic-bbb_4.4.0-140-1_armhf.snap
994 {
995- "pc-kernel": {
996- "4.15.0-44.46": {
997+ "linux-generic-bbb": {
998+ "4.4.0-140-1": {
999 "linux-image-generic": [
1000- "3871-2",
1001- "4489-1"
1002+ "3848-1",
1003+ "3879-1"
1004+ ],
1005+ "snapcraft": [
1006+ "5501-1"
1007 ]
1008 }
1009 }
1010 }
1011
1012-Running: snap-check-notices --no-fetch --with-cves ./tests/pc-kernel_4.15.0-44.46_i386.snap
1013+Running: USNDB='./tests/test-usn-kernel-and-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/linux-generic-bbb_4.4.0-140-1_armhf.snap
1014 {
1015- "pc-kernel": {
1016+ "linux-generic-bbb": {
1017+ "4.4.0-140-1": {
1018+ "linux-image-generic": {
1019+ "3848-1": [
1020+ "CVE-2017-18174",
1021+ "CVE-2018-12896",
1022+ "CVE-2018-18690",
1023+ "CVE-2018-18710"
1024+ ],
1025+ "3879-1": [
1026+ "CVE-2018-10883",
1027+ "CVE-2018-16862",
1028+ "CVE-2018-19407",
1029+ "CVE-2018-19824",
1030+ "CVE-2018-20169"
1031+ ]
1032+ },
1033+ "snapcraft": {
1034+ "5501-1": [
1035+ "CVE-2020-9999"
1036+ ]
1037+ }
1038+ }
1039+ }
1040+}
1041+
1042+Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch ./tests/linux-generic-bbb_4.4.0-140-1_armhf.snap
1043+{
1044+ "linux-generic-bbb": {
1045+ "4.4.0-140-1": {
1046+ "snapcraft": [
1047+ "5501-1"
1048+ ]
1049+ }
1050+ }
1051+}
1052+
1053+Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/linux-generic-bbb_4.4.0-140-1_armhf.snap
1054+{
1055+ "linux-generic-bbb": {
1056+ "4.4.0-140-1": {
1057+ "snapcraft": {
1058+ "5501-1": [
1059+ "CVE-2020-9999"
1060+ ]
1061+ }
1062+ }
1063+ }
1064+}
1065+
1066+Running: USNDB='./tests/test-usn-unittest-build-pkgs-only.db' snap-check-notices --no-fetch ./tests/linux-generic-bbb_4.4.0-140-1_armhf.snap
1067+{
1068+ "linux-generic-bbb": {
1069+ "4.4.0-140-1": {
1070+ "snapcraft": [
1071+ "5501-1"
1072+ ]
1073+ }
1074+ }
1075+}
1076+
1077+Running: USNDB='./tests/test-usn-unittest-build-pkgs-only.db' snap-check-notices --no-fetch --with-cves ./tests/linux-generic-bbb_4.4.0-140-1_armhf.snap
1078+{
1079+ "linux-generic-bbb": {
1080+ "4.4.0-140-1": {
1081+ "snapcraft": {
1082+ "5501-1": [
1083+ "CVE-2020-9999"
1084+ ]
1085+ }
1086+ }
1087+ }
1088+}
1089+
1090+Running: snap-check-notices --no-fetch ./tests/pc-kernel_4.15.0-44.46_i386.snap
1091+{
1092+ "pc-kernel": {
1093+ "4.15.0-44.46": {
1094+ "linux-image-generic": [
1095+ "3871-2",
1096+ "4489-1"
1097+ ]
1098+ }
1099+ }
1100+}
1101+
1102+Running: snap-check-notices --no-fetch --with-cves ./tests/pc-kernel_4.15.0-44.46_i386.snap
1103+{
1104+ "pc-kernel": {
1105+ "4.15.0-44.46": {
1106+ "linux-image-generic": {
1107+ "3871-2": [
1108+ "https://launchpad.net/bugs/1813663",
1109+ "https://launchpad.net/bugs/1813727"
1110+ ],
1111+ "4489-1": [
1112+ "CVE-2020-14386"
1113+ ]
1114+ }
1115+ }
1116+ }
1117+}
1118+
1119+Running: USNDB='./tests/test-usn-kernel-and-build-pkgs.db' snap-check-notices --no-fetch ./tests/pc-kernel_4.15.0-44.46_i386.snap
1120+{
1121+ "pc-kernel": {
1122+ "4.15.0-44.46": {
1123+ "linux-image-generic": [
1124+ "3871-2",
1125+ "4489-1"
1126+ ],
1127+ "snapcraft": [
1128+ "5501-1"
1129+ ]
1130+ }
1131+ }
1132+}
1133+
1134+Running: USNDB='./tests/test-usn-kernel-and-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/pc-kernel_4.15.0-44.46_i386.snap
1135+{
1136+ "pc-kernel": {
1137 "4.15.0-44.46": {
1138 "linux-image-generic": {
1139 "3871-2": [
1140@@ -1180,6 +1619,59 @@ Running: snap-check-notices --no-fetch --with-cves ./tests/pc-kernel_4.15.0-44.4
1141 "4489-1": [
1142 "CVE-2020-14386"
1143 ]
1144+ },
1145+ "snapcraft": {
1146+ "5501-1": [
1147+ "CVE-2020-9999"
1148+ ]
1149+ }
1150+ }
1151+ }
1152+}
1153+
1154+Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch ./tests/pc-kernel_4.15.0-44.46_i386.snap
1155+{
1156+ "pc-kernel": {
1157+ "4.15.0-44.46": {
1158+ "snapcraft": [
1159+ "5501-1"
1160+ ]
1161+ }
1162+ }
1163+}
1164+
1165+Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/pc-kernel_4.15.0-44.46_i386.snap
1166+{
1167+ "pc-kernel": {
1168+ "4.15.0-44.46": {
1169+ "snapcraft": {
1170+ "5501-1": [
1171+ "CVE-2020-9999"
1172+ ]
1173+ }
1174+ }
1175+ }
1176+}
1177+
1178+Running: USNDB='./tests/test-usn-unittest-build-pkgs-only.db' snap-check-notices --no-fetch ./tests/pc-kernel_4.15.0-44.46_i386.snap
1179+{
1180+ "pc-kernel": {
1181+ "4.15.0-44.46": {
1182+ "snapcraft": [
1183+ "5501-1"
1184+ ]
1185+ }
1186+ }
1187+}
1188+
1189+Running: USNDB='./tests/test-usn-unittest-build-pkgs-only.db' snap-check-notices --no-fetch --with-cves ./tests/pc-kernel_4.15.0-44.46_i386.snap
1190+{
1191+ "pc-kernel": {
1192+ "4.15.0-44.46": {
1193+ "snapcraft": {
1194+ "5501-1": [
1195+ "CVE-2020-9999"
1196+ ]
1197 }
1198 }
1199 }
1200@@ -1213,6 +1705,90 @@ Running: snap-check-notices --no-fetch --with-cves ./tests/pc-kernel_4.4.0-141.1
1201 }
1202 }
1203
1204+Running: USNDB='./tests/test-usn-kernel-and-build-pkgs.db' snap-check-notices --no-fetch ./tests/pc-kernel_4.4.0-141.167_amd64.snap
1205+{
1206+ "pc-kernel": {
1207+ "4.4.0-141.167": {
1208+ "linux-image-generic": [
1209+ "3879-1"
1210+ ],
1211+ "snapcraft": [
1212+ "5501-1"
1213+ ]
1214+ }
1215+ }
1216+}
1217+
1218+Running: USNDB='./tests/test-usn-kernel-and-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/pc-kernel_4.4.0-141.167_amd64.snap
1219+{
1220+ "pc-kernel": {
1221+ "4.4.0-141.167": {
1222+ "linux-image-generic": {
1223+ "3879-1": [
1224+ "CVE-2018-10883",
1225+ "CVE-2018-16862",
1226+ "CVE-2018-19407",
1227+ "CVE-2018-19824",
1228+ "CVE-2018-20169"
1229+ ]
1230+ },
1231+ "snapcraft": {
1232+ "5501-1": [
1233+ "CVE-2020-9999"
1234+ ]
1235+ }
1236+ }
1237+ }
1238+}
1239+
1240+Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch ./tests/pc-kernel_4.4.0-141.167_amd64.snap
1241+{
1242+ "pc-kernel": {
1243+ "4.4.0-141.167": {
1244+ "snapcraft": [
1245+ "5501-1"
1246+ ]
1247+ }
1248+ }
1249+}
1250+
1251+Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/pc-kernel_4.4.0-141.167_amd64.snap
1252+{
1253+ "pc-kernel": {
1254+ "4.4.0-141.167": {
1255+ "snapcraft": {
1256+ "5501-1": [
1257+ "CVE-2020-9999"
1258+ ]
1259+ }
1260+ }
1261+ }
1262+}
1263+
1264+Running: USNDB='./tests/test-usn-unittest-build-pkgs-only.db' snap-check-notices --no-fetch ./tests/pc-kernel_4.4.0-141.167_amd64.snap
1265+{
1266+ "pc-kernel": {
1267+ "4.4.0-141.167": {
1268+ "snapcraft": [
1269+ "5501-1"
1270+ ]
1271+ }
1272+ }
1273+}
1274+
1275+Running: USNDB='./tests/test-usn-unittest-build-pkgs-only.db' snap-check-notices --no-fetch --with-cves ./tests/pc-kernel_4.4.0-141.167_amd64.snap
1276+{
1277+ "pc-kernel": {
1278+ "4.4.0-141.167": {
1279+ "snapcraft": {
1280+ "5501-1": [
1281+ "CVE-2020-9999"
1282+ ]
1283+ }
1284+ }
1285+ }
1286+}
1287+
1288 Running: snap-check-notices --no-fetch ./tests/gke-kernel_4.15.0-1069.72_amd64.snap
1289 {
1290 "gke-kernel": {
1291@@ -1227,6 +1803,78 @@ Running: snap-check-notices --no-fetch --with-cves ./tests/gke-kernel_4.15.0-106
1292 }
1293 }
1294
1295+Running: USNDB='./tests/test-usn-kernel-and-build-pkgs.db' snap-check-notices --no-fetch ./tests/gke-kernel_4.15.0-1069.72_amd64.snap
1296+{
1297+ "gke-kernel": {
1298+ "4.15.0-1069.72": {
1299+ "snapcraft": [
1300+ "5501-1"
1301+ ]
1302+ }
1303+ }
1304+}
1305+
1306+Running: USNDB='./tests/test-usn-kernel-and-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/gke-kernel_4.15.0-1069.72_amd64.snap
1307+{
1308+ "gke-kernel": {
1309+ "4.15.0-1069.72": {
1310+ "snapcraft": {
1311+ "5501-1": [
1312+ "CVE-2020-9999"
1313+ ]
1314+ }
1315+ }
1316+ }
1317+}
1318+
1319+Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch ./tests/gke-kernel_4.15.0-1069.72_amd64.snap
1320+{
1321+ "gke-kernel": {
1322+ "4.15.0-1069.72": {
1323+ "snapcraft": [
1324+ "5501-1"
1325+ ]
1326+ }
1327+ }
1328+}
1329+
1330+Running: USNDB='./tests/test-usn-unittest-build-pkgs.db' snap-check-notices --no-fetch --with-cves ./tests/gke-kernel_4.15.0-1069.72_amd64.snap
1331+{
1332+ "gke-kernel": {
1333+ "4.15.0-1069.72": {
1334+ "snapcraft": {
1335+ "5501-1": [
1336+ "CVE-2020-9999"
1337+ ]
1338+ }
1339+ }
1340+ }
1341+}
1342+
1343+Running: USNDB='./tests/test-usn-unittest-build-pkgs-only.db' snap-check-notices --no-fetch ./tests/gke-kernel_4.15.0-1069.72_amd64.snap
1344+{
1345+ "gke-kernel": {
1346+ "4.15.0-1069.72": {
1347+ "snapcraft": [
1348+ "5501-1"
1349+ ]
1350+ }
1351+ }
1352+}
1353+
1354+Running: USNDB='./tests/test-usn-unittest-build-pkgs-only.db' snap-check-notices --no-fetch --with-cves ./tests/gke-kernel_4.15.0-1069.72_amd64.snap
1355+{
1356+ "gke-kernel": {
1357+ "4.15.0-1069.72": {
1358+ "snapcraft": {
1359+ "5501-1": [
1360+ "CVE-2020-9999"
1361+ ]
1362+ }
1363+ }
1364+ }
1365+}
1366+
1367 Running: snap-check-notices --no-fetch ./tests/test-check-notices_0.1_amd64.snap
1368 {
1369 "test-check-notices": {
1370diff --git a/tests/test-usn-kernel-and-build-pkgs.db b/tests/test-usn-kernel-and-build-pkgs.db
1371new file mode 100644
1372index 0000000..cc3de1e
1373--- /dev/null
1374+++ b/tests/test-usn-kernel-and-build-pkgs.db
1375@@ -0,0 +1,18264 @@
1376+{
1377+ "3871-4": {
1378+ "description": "USN-3871-1 fixed vulnerabilities in the Linux kernel for Ubuntu 18.04\nLTS. This update provides the corresponding updates for the Linux\nHardware Enablement (HWE) kernel from Ubuntu 18.04 LTS for Ubuntu\n16.04 LTS.\n\nWen Xu discovered that a use-after-free vulnerability existed in the ext4\nfilesystem implementation in the Linux kernel. An attacker could use this\nto construct a malicious ext4 image that, when mounted, could cause a\ndenial of service (system crash) or possibly execute arbitrary code.\n(CVE-2018-10876, CVE-2018-10879)\n\nWen Xu discovered that a buffer overflow existed in the ext4 filesystem\nimplementation in the Linux kernel. An attacker could use this to construct\na malicious ext4 image that, when mounted, could cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2018-10877)\n\nWen Xu discovered that an out-of-bounds write vulnerability existed in the\next4 filesystem implementation in the Linux kernel. An attacker could use\nthis to construct a malicious ext4 image that, when mounted, could cause a\ndenial of service (system crash) or possibly execute arbitrary code.\n(CVE-2018-10878, CVE-2018-10882)\n\nWen Xu discovered that the ext4 filesystem implementation in the Linux\nkernel did not properly ensure that xattr information remained in inode\nbodies. An attacker could use this to construct a malicious ext4 image\nthat, when mounted, could cause a denial of service (system crash).\n(CVE-2018-10880)\n\nWen Xu discovered that the ext4 file system implementation in the Linux\nkernel could possibly perform an out of bounds write when updating the\njournal for an inline file. An attacker could use this to construct a\nmalicious ext4 image that, when mounted, could cause a denial of service\n(system crash). (CVE-2018-10883)\n\nIt was discovered that a race condition existed in the vsock address family\nimplementation of the Linux kernel that could lead to a use-after-free\ncondition. A local attacker in a guest virtual machine could use this to\nexpose sensitive information (host machine kernel memory). (CVE-2018-14625)\n\nCfir Cohen discovered that a use-after-free vulnerability existed in the\nKVM implementation of the Linux kernel, when handling interrupts in\nenvironments where nested virtualization is in use (nested KVM\nvirtualization is not enabled by default in Ubuntu kernels). A local\nattacker in a guest VM could possibly use this to gain administrative\nprivileges in a host machine. (CVE-2018-16882)\n\nJann Horn discovered that the procfs file system implementation in the\nLinux kernel did not properly restrict the ability to inspect the kernel\nstack of an arbitrary task. A local attacker could use this to expose\nsensitive information. (CVE-2018-17972)\n\nJann Horn discovered that the mremap() system call in the Linux kernel did\nnot properly flush the TLB when completing, potentially leaving access to a\nphysical page after it has been released to the page allocator. A local\nattacker could use this to cause a denial of service (system crash), expose\nsensitive information, or possibly execute arbitrary code. (CVE-2018-18281)\n\nWei Wu discovered that the KVM implementation in the Linux kernel did not\nproperly ensure that ioapics were initialized. A local attacker could use\nthis to cause a denial of service (system crash). (CVE-2018-19407)\n\nIt was discovered that the debug interface for the Linux kernel's HID\nsubsystem did not properly perform bounds checking in some situations. An\nattacker with access to debugfs could use this to cause a denial of service\nor possibly gain additional privileges. (CVE-2018-9516)\n",
1379+ "releases": {
1380+ "xenial": {
1381+ "allbinaries": {
1382+ "linux-image-4.15.0-1032-aws": {
1383+ "version": "4.15.0-1032.34~16.04.1"
1384+ },
1385+ "linux-image-4.15.0-1027-gcp": {
1386+ "version": "4.15.0-1027.28~16.04.1"
1387+ },
1388+ "linux-image-virtual-hwe-16.04": {
1389+ "version": "4.15.0.45.66"
1390+ },
1391+ "linux-image-4.15.0-45-generic": {
1392+ "version": "4.15.0-45.48~16.04.1"
1393+ },
1394+ "linux-image-gke": {
1395+ "version": "4.15.0.1027.41"
1396+ },
1397+ "linux-image-gcp": {
1398+ "version": "4.15.0.1027.41"
1399+ },
1400+ "linux-image-4.15.0-45-lowlatency": {
1401+ "version": "4.15.0-45.48~16.04.1"
1402+ },
1403+ "linux-image-lowlatency-hwe-16.04": {
1404+ "version": "4.15.0.45.66"
1405+ },
1406+ "linux-image-oem": {
1407+ "version": "4.15.0.45.66"
1408+ },
1409+ "linux-image-generic-hwe-16.04": {
1410+ "version": "4.15.0.45.66"
1411+ },
1412+ "linux-image-generic-lpae-hwe-16.04": {
1413+ "version": "4.15.0.45.66"
1414+ },
1415+ "linux-image-4.15.0-45-generic-lpae": {
1416+ "version": "4.15.0-45.48~16.04.1"
1417+ },
1418+ "linux-image-aws-hwe": {
1419+ "version": "4.15.0.1032.33"
1420+ }
1421+ },
1422+ "binaries": {
1423+ "linux-image-4.15.0-1032-aws": {
1424+ "version": "4.15.0-1032.34~16.04.1"
1425+ },
1426+ "linux-image-4.15.0-1027-gcp": {
1427+ "version": "4.15.0-1027.28~16.04.1"
1428+ },
1429+ "linux-image-virtual-hwe-16.04": {
1430+ "version": "4.15.0.45.66"
1431+ },
1432+ "linux-image-4.15.0-45-generic": {
1433+ "version": "4.15.0-45.48~16.04.1"
1434+ },
1435+ "linux-image-gke": {
1436+ "version": "4.15.0.1027.41"
1437+ },
1438+ "linux-image-gcp": {
1439+ "version": "4.15.0.1027.41"
1440+ },
1441+ "linux-image-4.15.0-45-lowlatency": {
1442+ "version": "4.15.0-45.48~16.04.1"
1443+ },
1444+ "linux-image-lowlatency-hwe-16.04": {
1445+ "version": "4.15.0.45.66"
1446+ },
1447+ "linux-image-oem": {
1448+ "version": "4.15.0.45.66"
1449+ },
1450+ "linux-image-generic-hwe-16.04": {
1451+ "version": "4.15.0.45.66"
1452+ },
1453+ "linux-image-generic-lpae-hwe-16.04": {
1454+ "version": "4.15.0.45.66"
1455+ },
1456+ "linux-image-4.15.0-45-generic-lpae": {
1457+ "version": "4.15.0-45.48~16.04.1"
1458+ },
1459+ "linux-image-aws-hwe": {
1460+ "version": "4.15.0.1032.33"
1461+ }
1462+ },
1463+ "archs": {
1464+ "all": {
1465+ "urls": {
1466+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-headers-4.15.0-45_4.15.0-45.48~16.04.1_all.deb": {
1467+ "size": 10982794,
1468+ "md5": "6f39f8c25fa2d54bbc3fc72c8991b2fc"
1469+ },
1470+ "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-aws-hwe/linux-aws-headers-4.15.0-1032_4.15.0-1032.34~16.04.1_all.deb": {
1471+ "size": 11060706,
1472+ "md5": "2ad2bd82af7598dee9edcfeb3c9f71e9"
1473+ },
1474+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-source-4.15.0_4.15.0-45.48~16.04.1_all.deb": {
1475+ "size": 130352886,
1476+ "md5": "c4865fe44a301a0894db2655abe37749"
1477+ }
1478+ }
1479+ },
1480+ "amd64": {
1481+ "urls": {
1482+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-hwe-tools-4.15.0-45_4.15.0-45.48~16.04.1_amd64.deb": {
1483+ "size": 4081638,
1484+ "md5": "b8bef9212883bca725c2ac54b798f0d0"
1485+ },
1486+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-tools-lowlatency-hwe-16.04_4.15.0.45.66_amd64.deb": {
1487+ "size": 2400,
1488+ "md5": "c9d0fb8b6cbe7e234bfd80cc97b255f9"
1489+ },
1490+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-tools-4.15.0-45-lowlatency_4.15.0-45.48~16.04.1_amd64.deb": {
1491+ "size": 1918,
1492+ "md5": "972d923dfcd7c4a72188a5c7cae9895c"
1493+ },
1494+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-tools-oem_4.15.0.45.66_amd64.deb": {
1495+ "size": 1790,
1496+ "md5": "460eec238c126bd29e84b24cb74f79d3"
1497+ },
1498+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/sata-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1499+ "size": 95040,
1500+ "md5": "775287b250447ce6ba1f9d992f8f53ba"
1501+ },
1502+ "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-meta-aws-hwe/linux-headers-aws-hwe_4.15.0.1032.33_amd64.deb": {
1503+ "size": 2270,
1504+ "md5": "e21b7670969d318a5c8946102ad80999"
1505+ },
1506+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-gcp/linux-image-unsigned-4.15.0-1027-gcp_4.15.0-1027.28~16.04.1_amd64.deb": {
1507+ "size": 7932238,
1508+ "md5": "68afd171fec1739f257ce207f464e066"
1509+ },
1510+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/pcmcia-storage-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1511+ "size": 66176,
1512+ "md5": "c1b6edd13910da218d5fd8dcf7616eeb"
1513+ },
1514+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-gcp/linux-buildinfo-4.15.0-1027-gcp_4.15.0-1027.28~16.04.1_amd64.deb": {
1515+ "size": 270576,
1516+ "md5": "caa13f3482e5c90ae40deb5f1f4f0a00"
1517+ },
1518+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-gcp/linux-gcp-headers-4.15.0-1027_4.15.0-1027.28~16.04.1_amd64.deb": {
1519+ "size": 11093846,
1520+ "md5": "eba5b25154367a29e64860c254caf150"
1521+ },
1522+ "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-meta-aws-hwe/linux-image-aws-hwe_4.15.0.1032.33_amd64.deb": {
1523+ "size": 2264,
1524+ "md5": "ebcf8571487477a5afa5977356c25d74"
1525+ },
1526+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-gcp/linux-gke_4.15.0.1027.41_amd64.deb": {
1527+ "size": 1800,
1528+ "md5": "afc46b505380dfaa352f23107c9e04ae"
1529+ },
1530+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-headers-4.15.0-45-generic_4.15.0-45.48~16.04.1_amd64.deb": {
1531+ "size": 1147014,
1532+ "md5": "aeba7d82608a453d28002cc521546964"
1533+ },
1534+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-signed-hwe/linux-image-4.15.0-45-lowlatency_4.15.0-45.48~16.04.1_amd64.deb": {
1535+ "size": 7951452,
1536+ "md5": "6516f6c808cc14d741e832a912885000"
1537+ },
1538+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-gcp/linux-gcp_4.15.0.1027.41_amd64.deb": {
1539+ "size": 1800,
1540+ "md5": "00721317d25fc9fccf57ab28af745ace"
1541+ },
1542+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-buildinfo-4.15.0-45-lowlatency_4.15.0-45.48~16.04.1_amd64.deb": {
1543+ "size": 262240,
1544+ "md5": "1256e9df54ef82f71955d289cd1f85ae"
1545+ },
1546+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-cloud-tools-4.15.0-45-lowlatency_4.15.0-45.48~16.04.1_amd64.deb": {
1547+ "size": 1830,
1548+ "md5": "2c0b3e7dcc3976d492c58a282f2ed1ee"
1549+ },
1550+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/storage-core-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1551+ "size": 49850,
1552+ "md5": "60e3d1583278b3d25ff4015c38d234ef"
1553+ },
1554+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/nfs-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1555+ "size": 510240,
1556+ "md5": "f4a25bf4336e24a178e974dc5eac934d"
1557+ },
1558+ "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-aws-hwe/linux-image-4.15.0-1032-aws_4.15.0-1032.34~16.04.1_amd64.deb": {
1559+ "size": 7577536,
1560+ "md5": "3b39e423e2cf73803e526dcbb9924264"
1561+ },
1562+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/parport-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1563+ "size": 31594,
1564+ "md5": "f0bc31606e48a8da682345dd3eeb7569"
1565+ },
1566+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-image-unsigned-4.15.0-45-lowlatency_4.15.0-45.48~16.04.1_amd64.deb": {
1567+ "size": 8002966,
1568+ "md5": "5e431120c0ad140cfd7c7096b6f33336"
1569+ },
1570+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-gcp/linux-headers-4.15.0-1027-gcp_4.15.0-1027.28~16.04.1_amd64.deb": {
1571+ "size": 1148040,
1572+ "md5": "1039a56ec974cb2fd206792f8aa8b8c3"
1573+ },
1574+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-gcp/linux-tools-gcp_4.15.0.1027.41_amd64.deb": {
1575+ "size": 2364,
1576+ "md5": "062d15a730ec792eb8f06fc4ea730f54"
1577+ },
1578+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-gcp/linux-modules-extra-gcp_4.15.0.1027.41_amd64.deb": {
1579+ "size": 2382,
1580+ "md5": "1601eeb375a418e99da530d17076e395"
1581+ },
1582+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-signed-image-lowlatency-hwe-16.04_4.15.0.45.66_amd64.deb": {
1583+ "size": 1828,
1584+ "md5": "66d9a773165fdf9684cc0a715a144cb7"
1585+ },
1586+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-gcp/linux-tools-gke_4.15.0.1027.41_amd64.deb": {
1587+ "size": 2370,
1588+ "md5": "3329e8432edf1c12b07f737e44ef49f1"
1589+ },
1590+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-image-lowlatency-hwe-16.04_4.15.0.45.66_amd64.deb": {
1591+ "size": 2434,
1592+ "md5": "e766e9e69bcd3e1c66be248bd428ad36"
1593+ },
1594+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-headers-oem_4.15.0.45.66_amd64.deb": {
1595+ "size": 1790,
1596+ "md5": "b5dbcc0cb56721b312aa43c831384861"
1597+ },
1598+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/fs-core-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1599+ "size": 1328070,
1600+ "md5": "bc7b67216b6c1321c2e2f565779a66ff"
1601+ },
1602+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/ppp-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1603+ "size": 25208,
1604+ "md5": "4d9084d79c7217391040e650092b064d"
1605+ },
1606+ "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-aws-hwe/linux-aws-hwe-tools-4.15.0-1032_4.15.0-1032.34~16.04.1_amd64.deb": {
1607+ "size": 3727990,
1608+ "md5": "630c26b2a83ceb1e6dc7634f979c6edc"
1609+ },
1610+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/floppy-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1611+ "size": 34376,
1612+ "md5": "ad1c8cd8a9606f414e5f7c17e896a5eb"
1613+ },
1614+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-image-extra-virtual-hwe-16.04_4.15.0.45.66_amd64.deb": {
1615+ "size": 1800,
1616+ "md5": "5444064475c42d4b5320e83dcb91100f"
1617+ },
1618+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-headers-lowlatency-hwe-16.04_4.15.0.45.66_amd64.deb": {
1619+ "size": 2394,
1620+ "md5": "10579fdf79fc2fb74de9b5ae4b402a30"
1621+ },
1622+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/ipmi-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1623+ "size": 61848,
1624+ "md5": "211d97f2f4909ca74785dd280812a5af"
1625+ },
1626+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-gcp/linux-image-gcp_4.15.0.1027.41_amd64.deb": {
1627+ "size": 2362,
1628+ "md5": "ca724436895bcfb26e554020e5a05d2d"
1629+ },
1630+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-generic-hwe-16.04_4.15.0.45.66_amd64.deb": {
1631+ "size": 1802,
1632+ "md5": "d0dc38f457961b0b5061c7cc41dc1318"
1633+ },
1634+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-signed-image-oem_4.15.0.45.66_amd64.deb": {
1635+ "size": 1802,
1636+ "md5": "63cded918c4d196c77635543a9c10107"
1637+ },
1638+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-gcp/linux-modules-extra-4.15.0-1027-gcp_4.15.0-1027.28~16.04.1_amd64.deb": {
1639+ "size": 32447190,
1640+ "md5": "150f027d75b9582f68d044cefe80c1ec"
1641+ },
1642+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/message-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1643+ "size": 206546,
1644+ "md5": "9b591c0de281e924bcf1633f95ca7194"
1645+ },
1646+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-hwe-udebs-generic_4.15.0-45.48~16.04.1_amd64.udeb": {
1647+ "size": 938,
1648+ "md5": "561f946c0a1aaa4b50f75b734b6f17ab"
1649+ },
1650+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/fs-secondary-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1651+ "size": 702612,
1652+ "md5": "17280aa81e1a74ba2d60a9a4990ef18a"
1653+ },
1654+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-gcp/linux-modules-extra-gke_4.15.0.1027.41_amd64.deb": {
1655+ "size": 2382,
1656+ "md5": "c4e48ede060416ca970c7fcdee56b47c"
1657+ },
1658+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/pata-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1659+ "size": 122146,
1660+ "md5": "0427eca2e07f9beac889388f3fff7e5c"
1661+ },
1662+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/multipath-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1663+ "size": 18324,
1664+ "md5": "471bb6b49c713e7d1a36b35ebd859007"
1665+ },
1666+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/irda-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1667+ "size": 210254,
1668+ "md5": "c0aed40a5f181db0b1c34996f5e941a6"
1669+ },
1670+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-image-generic-hwe-16.04_4.15.0.45.66_amd64.deb": {
1671+ "size": 2440,
1672+ "md5": "bf6292bfea09cdb453d597a7a09fdeb1"
1673+ },
1674+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-headers-virtual-hwe-16.04_4.15.0.45.66_amd64.deb": {
1675+ "size": 1780,
1676+ "md5": "d2c2530f8ea040a9c270c28992d90979"
1677+ },
1678+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-tools-4.15.0-45-generic_4.15.0-45.48~16.04.1_amd64.deb": {
1679+ "size": 1906,
1680+ "md5": "9c75f0005e0acd789479fd63965090a9"
1681+ },
1682+ "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-aws-hwe/linux-tools-4.15.0-1032-aws_4.15.0-1032.34~16.04.1_amd64.deb": {
1683+ "size": 1890,
1684+ "md5": "df99be106a06be626fe4f461e7d66483"
1685+ },
1686+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-virtual-hwe-16.04_4.15.0.45.66_amd64.deb": {
1687+ "size": 1796,
1688+ "md5": "9b4a9a962a01c3076dabf804abf57557"
1689+ },
1690+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/serial-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1691+ "size": 92142,
1692+ "md5": "ddcadcaf603f2353b6a10903413a3885"
1693+ },
1694+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/plip-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1695+ "size": 8662,
1696+ "md5": "6237befccf680ce9a223517d6ce9c1f6"
1697+ },
1698+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/usb-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1699+ "size": 139488,
1700+ "md5": "79bccf4eacb3fa32a8af1ca19f26d2bc"
1701+ },
1702+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/block-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1703+ "size": 364378,
1704+ "md5": "dbad9a08699ad8c5972674a6d7fb84f0"
1705+ },
1706+ "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-meta-aws-hwe/linux-aws-edge_4.15.0.1032.33_amd64.deb": {
1707+ "size": 1776,
1708+ "md5": "40ae2e86513640dd73da041ef35a96b6"
1709+ },
1710+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/fat-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1711+ "size": 4282,
1712+ "md5": "fe4fed8d1b3bfb1f029d59d8d18fce2e"
1713+ },
1714+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/nic-usb-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1715+ "size": 315992,
1716+ "md5": "6d3d0f084ed1f9a1dbe1ca3ac1241b9f"
1717+ },
1718+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-cloud-tools-lowlatency-hwe-16.04_4.15.0.45.66_amd64.deb": {
1719+ "size": 2414,
1720+ "md5": "3c52f8be731d98ffe4eff20e35bcdf6b"
1721+ },
1722+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/input-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1723+ "size": 430582,
1724+ "md5": "07ecd27d0be68603a79376456deb9135"
1725+ },
1726+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-oem_4.15.0.45.66_amd64.deb": {
1727+ "size": 1810,
1728+ "md5": "1375a62622c7bd4381a3cc37f8603f14"
1729+ },
1730+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-image-oem_4.15.0.45.66_amd64.deb": {
1731+ "size": 1808,
1732+ "md5": "00a5367d9978e68267424c229a2046aa"
1733+ },
1734+ "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-meta-aws-hwe/linux-tools-aws-hwe_4.15.0.1032.33_amd64.deb": {
1735+ "size": 2272,
1736+ "md5": "a33b9812ac5ed93c502a0015f8d57bfb"
1737+ },
1738+ "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-aws-hwe/linux-modules-4.15.0-1032-aws_4.15.0-1032.34~16.04.1_amd64.deb": {
1739+ "size": 12298950,
1740+ "md5": "66bffa11286af3078f22315fd36b5231"
1741+ },
1742+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-gcp/linux-headers-gcp_4.15.0.1027.41_amd64.deb": {
1743+ "size": 2368,
1744+ "md5": "e74ff8850265b285fe033bf9ff7b3b8f"
1745+ },
1746+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-signed-generic-hwe-16.04_4.15.0.45.66_amd64.deb": {
1747+ "size": 1826,
1748+ "md5": "4f8260328d0246678d0de44293bafc41"
1749+ },
1750+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/md-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1751+ "size": 285160,
1752+ "md5": "483407d1c29ee5ede1bbac3494563e5b"
1753+ },
1754+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-modules-extra-4.15.0-45-generic_4.15.0-45.48~16.04.1_amd64.deb": {
1755+ "size": 32646320,
1756+ "md5": "9e5784c49e7517fb4e2b2d246dbbfa56"
1757+ },
1758+ "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-aws-hwe/linux-buildinfo-4.15.0-1032-aws_4.15.0-1032.34~16.04.1_amd64.deb": {
1759+ "size": 189550,
1760+ "md5": "5b3be63e17d33703d6c065d0d1a93e80"
1761+ },
1762+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/fb-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1763+ "size": 13616,
1764+ "md5": "b0c805916f8bf8bee21a6729dcc7cccc"
1765+ },
1766+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/nic-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1767+ "size": 4575704,
1768+ "md5": "a2f8fc6fce4093091867fced0b136fe3"
1769+ },
1770+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-modules-4.15.0-45-lowlatency_4.15.0-45.48~16.04.1_amd64.deb": {
1771+ "size": 45589634,
1772+ "md5": "5865bed7fae057423962aee9f9afd093"
1773+ },
1774+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-signed-gcp/linux-image-4.15.0-1027-gcp_4.15.0-1027.28~16.04.1_amd64.deb": {
1775+ "size": 7867140,
1776+ "md5": "fe83445d32385881b25001e3b166d3f5"
1777+ },
1778+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-cloud-tools-4.15.0-45-generic_4.15.0-45.48~16.04.1_amd64.deb": {
1779+ "size": 1822,
1780+ "md5": "beb5fa34716d0aa621b92ca67c2a5ce1"
1781+ },
1782+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-cloud-tools-generic-hwe-16.04_4.15.0.45.66_amd64.deb": {
1783+ "size": 2410,
1784+ "md5": "521515f9e9a61574854fb3351f896fb9"
1785+ },
1786+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-cloud-tools-virtual-hwe-16.04_4.15.0.45.66_amd64.deb": {
1787+ "size": 2432,
1788+ "md5": "c0dc27b9026d12a8c747a4e28987b0c1"
1789+ },
1790+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/kernel-image-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1791+ "size": 8864386,
1792+ "md5": "ae8ec36805cbced625f5c9d70d5730f1"
1793+ },
1794+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/nic-pcmcia-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1795+ "size": 143582,
1796+ "md5": "967acda4e336c0aba5ef3ac22671fe2d"
1797+ },
1798+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-gcp/linux-image-gke_4.15.0.1027.41_amd64.deb": {
1799+ "size": 2368,
1800+ "md5": "22432e19f7b43c8e4c9205d89725a0c7"
1801+ },
1802+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-headers-generic-hwe-16.04_4.15.0.45.66_amd64.deb": {
1803+ "size": 2392,
1804+ "md5": "5f1173ac634c723aeea74a488f4712ca"
1805+ },
1806+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/crypto-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1807+ "size": 322874,
1808+ "md5": "1bebeeba2210c9748f5f88a6c1c7e705"
1809+ },
1810+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-signed-lowlatency-hwe-16.04_4.15.0.45.66_amd64.deb": {
1811+ "size": 1834,
1812+ "md5": "b96971de3199c35754f5e8f8323506a2"
1813+ },
1814+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/nic-shared-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1815+ "size": 544322,
1816+ "md5": "ed24e8edbeb26b50c9b7f663fb24e58a"
1817+ },
1818+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/virtio-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1819+ "size": 112714,
1820+ "md5": "4262627d64111c19ef6c3dadbe68b0ef"
1821+ },
1822+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/mouse-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1823+ "size": 58272,
1824+ "md5": "7b52fafd830cb61783b388dfc6564c7a"
1825+ },
1826+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-gcp/linux-modules-4.15.0-1027-gcp_4.15.0-1027.28~16.04.1_amd64.deb": {
1827+ "size": 12751582,
1828+ "md5": "ddcfa808fadebde4a9a5df2ed778b06f"
1829+ },
1830+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/pcmcia-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1831+ "size": 63380,
1832+ "md5": "4739548d2741a8025766334cedbf326a"
1833+ },
1834+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-signed-hwe/kernel-signed-image-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1835+ "size": 7901880,
1836+ "md5": "8941e30f04b3bb1eee75a07da88ab10e"
1837+ },
1838+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-image-unsigned-4.15.0-45-generic_4.15.0-45.48~16.04.1_amd64.deb": {
1839+ "size": 7955228,
1840+ "md5": "12f5f734d717d32d7204b51b6d5ff191"
1841+ },
1842+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-headers-4.15.0-45-lowlatency_4.15.0-45.48~16.04.1_amd64.deb": {
1843+ "size": 1149368,
1844+ "md5": "dfa3f52f291031e000f573cf87eb2e9e"
1845+ },
1846+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-lowlatency-hwe-16.04_4.15.0.45.66_amd64.deb": {
1847+ "size": 1798,
1848+ "md5": "2652fd57f665a31b6b6f35f328883601"
1849+ },
1850+ "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-aws-hwe/linux-headers-4.15.0-1032-aws_4.15.0-1032.34~16.04.1_amd64.deb": {
1851+ "size": 971988,
1852+ "md5": "40dbb77772965895547019ee1276254c"
1853+ },
1854+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/firewire-core-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1855+ "size": 65360,
1856+ "md5": "54731897011e947b8e10a5cc2eb21586"
1857+ },
1858+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-tools-generic-hwe-16.04_4.15.0.45.66_amd64.deb": {
1859+ "size": 2394,
1860+ "md5": "15e57d026783e1753422c6ff7a59a6e5"
1861+ },
1862+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-gcp/linux-headers-gke_4.15.0.1027.41_amd64.deb": {
1863+ "size": 2364,
1864+ "md5": "3374f5d56f6596740245401ab9e859f2"
1865+ },
1866+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-hwe-cloud-tools-4.15.0-45_4.15.0-45.48~16.04.1_amd64.deb": {
1867+ "size": 71306,
1868+ "md5": "334c614d9f963953eeae0ba0985c878d"
1869+ },
1870+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/vlan-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1871+ "size": 25802,
1872+ "md5": "d3d2b98b2f26fae28d279963b550c8fc"
1873+ },
1874+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-gcp/linux-tools-4.15.0-1027-gcp_4.15.0-1027.28~16.04.1_amd64.deb": {
1875+ "size": 1888,
1876+ "md5": "acb6039003fdae05c2e7114eec8b90b3"
1877+ },
1878+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-modules-4.15.0-45-generic_4.15.0-45.48~16.04.1_amd64.deb": {
1879+ "size": 12879152,
1880+ "md5": "96dd846e96afd158b15c476aa9976b30"
1881+ },
1882+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-gcp/linux-gcp-tools-4.15.0-1027_4.15.0-1027.28~16.04.1_amd64.deb": {
1883+ "size": 3758770,
1884+ "md5": "86cd070b1b886561e0087e3eac8185b5"
1885+ },
1886+ "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-meta-aws-hwe/linux-aws-hwe_4.15.0.1032.33_amd64.deb": {
1887+ "size": 1802,
1888+ "md5": "50e50f08063d6cba58ac54d0cc1bf157"
1889+ },
1890+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-signed-oem_4.15.0.45.66_amd64.deb": {
1891+ "size": 1810,
1892+ "md5": "5293993e3e786237e43d5078a29c70a6"
1893+ },
1894+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-signed-image-generic-hwe-16.04_4.15.0.45.66_amd64.deb": {
1895+ "size": 1822,
1896+ "md5": "49ef0fc0bb927d1ee9b6fe5de36d5e5e"
1897+ },
1898+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-tools-virtual-hwe-16.04_4.15.0.45.66_amd64.deb": {
1899+ "size": 2416,
1900+ "md5": "da87a2968fd088eee1b7432f83e625e4"
1901+ },
1902+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-signed-hwe/linux-image-4.15.0-45-generic_4.15.0-45.48~16.04.1_amd64.deb": {
1903+ "size": 7903492,
1904+ "md5": "53af68f2d530e51bb1c793e3808ee6e5"
1905+ },
1906+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-buildinfo-4.15.0-45-generic_4.15.0-45.48~16.04.1_amd64.deb": {
1907+ "size": 262228,
1908+ "md5": "4435e2acae7f6809d229816ec861cecf"
1909+ },
1910+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/scsi-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_amd64.udeb": {
1911+ "size": 2531802,
1912+ "md5": "f0230a450da2dbe0d408378e5a04b890"
1913+ },
1914+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-image-virtual-hwe-16.04_4.15.0.45.66_amd64.deb": {
1915+ "size": 2410,
1916+ "md5": "60d689e571b20620bc8daff7d3b5ddc1"
1917+ }
1918+ }
1919+ },
1920+ "ppc64el": {
1921+ "urls": {
1922+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/ipmi-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_ppc64el.udeb": {
1923+ "size": 62050,
1924+ "md5": "66867e89c4fe132f8b02044db66bf4f1"
1925+ },
1926+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/crypto-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_ppc64el.udeb": {
1927+ "size": 259316,
1928+ "md5": "a9e73e1b4d69cb717ed65b0c83b94983"
1929+ },
1930+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/nic-shared-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_ppc64el.udeb": {
1931+ "size": 530126,
1932+ "md5": "b5f626682c9c45916862dbe85a5b22bd"
1933+ },
1934+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/plip-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_ppc64el.udeb": {
1935+ "size": 8864,
1936+ "md5": "3db0618ed36fc19109af94c523caf7e6"
1937+ },
1938+ "http://ports.ubuntu.com/pool/main/l/linux-signed-hwe/linux-image-4.15.0-45-generic_4.15.0-45.48~16.04.1_ppc64el.deb": {
1939+ "size": 5836188,
1940+ "md5": "cbb31a7fdd8ff3054c5cbddbd0816548"
1941+ },
1942+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/sata-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_ppc64el.udeb": {
1943+ "size": 109684,
1944+ "md5": "e9ff317fcd6f68dc4e2a863d1b5eea1f"
1945+ },
1946+ "http://ports.ubuntu.com/pool/main/l/linux-signed-hwe/kernel-signed-image-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_ppc64el.udeb": {
1947+ "size": 5968884,
1948+ "md5": "c98f02cec087bf9456147ad5b4410f80"
1949+ },
1950+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/block-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_ppc64el.udeb": {
1951+ "size": 355876,
1952+ "md5": "fe5036891ef0919c3bf94d65140d3411"
1953+ },
1954+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-hwe-udebs-generic_4.15.0-45.48~16.04.1_ppc64el.udeb": {
1955+ "size": 894,
1956+ "md5": "f0146d100ef0ffcefe90161d4db43fbd"
1957+ },
1958+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/virtio-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_ppc64el.udeb": {
1959+ "size": 10298,
1960+ "md5": "f32d57fd06d268e58451dbb4d8c63c40"
1961+ },
1962+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-modules-4.15.0-45-generic_4.15.0-45.48~16.04.1_ppc64el.deb": {
1963+ "size": 12026320,
1964+ "md5": "0df6562c44156bf14acf06221cf65dd2"
1965+ },
1966+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-headers-generic-hwe-16.04_4.15.0.45.66_ppc64el.deb": {
1967+ "size": 2390,
1968+ "md5": "afcc10c990dd1ac1bf3178352344b0d8"
1969+ },
1970+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/vlan-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_ppc64el.udeb": {
1971+ "size": 26422,
1972+ "md5": "e4f4681c8c5eedf8045a9ed83be59aae"
1973+ },
1974+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/fs-secondary-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_ppc64el.udeb": {
1975+ "size": 676544,
1976+ "md5": "e2786debedfebd83d6a27abd185c57c6"
1977+ },
1978+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/fs-core-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_ppc64el.udeb": {
1979+ "size": 1276696,
1980+ "md5": "38cdc9c26ba0ef763c0a2efe0551fb4d"
1981+ },
1982+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-virtual-hwe-16.04_4.15.0.45.66_ppc64el.deb": {
1983+ "size": 1794,
1984+ "md5": "a0f43f4dafe6e98983b64ef7b706465c"
1985+ },
1986+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/multipath-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_ppc64el.udeb": {
1987+ "size": 19350,
1988+ "md5": "f6a4202406f0e74d099f769e37b57e8a"
1989+ },
1990+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/md-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_ppc64el.udeb": {
1991+ "size": 275046,
1992+ "md5": "6ab525f10bb2ce65bec5f13799ec06e7"
1993+ },
1994+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/nic-usb-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_ppc64el.udeb": {
1995+ "size": 316996,
1996+ "md5": "cd2926ca29639df238e3217befb6da11"
1997+ },
1998+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-generic-hwe-16.04_4.15.0.45.66_ppc64el.deb": {
1999+ "size": 1802,
2000+ "md5": "cab59d20d869b338f4f2505e552c5ca4"
2001+ },
2002+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-hwe-tools-4.15.0-45_4.15.0-45.48~16.04.1_ppc64el.deb": {
2003+ "size": 3498866,
2004+ "md5": "7b2cb0dc687972e711b7d3ebdd0dee65"
2005+ },
2006+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-image-virtual-hwe-16.04_4.15.0.45.66_ppc64el.deb": {
2007+ "size": 2404,
2008+ "md5": "4179b6e75c8030be38d7bf3401b4fac4"
2009+ },
2010+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-headers-virtual-hwe-16.04_4.15.0.45.66_ppc64el.deb": {
2011+ "size": 1778,
2012+ "md5": "a7b1c81da8466db5ffe005b8a3ca0a7a"
2013+ },
2014+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-headers-4.15.0-45-generic_4.15.0-45.48~16.04.1_ppc64el.deb": {
2015+ "size": 962124,
2016+ "md5": "b739a90129ef58b11e870fb684c603fc"
2017+ },
2018+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/nic-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_ppc64el.udeb": {
2019+ "size": 4241610,
2020+ "md5": "3590a57245f351a3b75969a5cd29c37e"
2021+ },
2022+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-tools-generic-hwe-16.04_4.15.0.45.66_ppc64el.deb": {
2023+ "size": 2396,
2024+ "md5": "28cb35335dba41a93faf1e9c968dfc43"
2025+ },
2026+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-modules-extra-4.15.0-45-generic_4.15.0-45.48~16.04.1_ppc64el.deb": {
2027+ "size": 30403002,
2028+ "md5": "e7e741b8886550fe722b616edcf5f986"
2029+ },
2030+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/storage-core-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_ppc64el.udeb": {
2031+ "size": 106214,
2032+ "md5": "38921e122a4cdf1f10d47ec6d6d52033"
2033+ },
2034+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/message-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_ppc64el.udeb": {
2035+ "size": 199622,
2036+ "md5": "7c2a1ba04923eb6d6397bd45507083ef"
2037+ },
2038+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/input-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_ppc64el.udeb": {
2039+ "size": 410294,
2040+ "md5": "cc195b99d3728d634c4f7a0e76c9ad17"
2041+ },
2042+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-image-unsigned-4.15.0-45-generic_4.15.0-45.48~16.04.1_ppc64el.deb": {
2043+ "size": 5888416,
2044+ "md5": "57711a3cb6b0c63989fe7ae28784dd31"
2045+ },
2046+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-buildinfo-4.15.0-45-generic_4.15.0-45.48~16.04.1_ppc64el.deb": {
2047+ "size": 246888,
2048+ "md5": "e0216688574ee532ccc146d20ec26374"
2049+ },
2050+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-image-extra-virtual-hwe-16.04_4.15.0.45.66_ppc64el.deb": {
2051+ "size": 1798,
2052+ "md5": "381daa8fde8b07d33342fa25e3269aad"
2053+ },
2054+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/scsi-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_ppc64el.udeb": {
2055+ "size": 2312346,
2056+ "md5": "8d93bfc5a87a95d9b4896b13a8451b8e"
2057+ },
2058+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/floppy-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_ppc64el.udeb": {
2059+ "size": 36534,
2060+ "md5": "d04ed1b75b37a8750b68bd019cb1bc90"
2061+ },
2062+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-tools-virtual-hwe-16.04_4.15.0.45.66_ppc64el.deb": {
2063+ "size": 2410,
2064+ "md5": "9fb0a98382d2916eb9d7c512e2de702a"
2065+ },
2066+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/parport-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_ppc64el.udeb": {
2067+ "size": 36056,
2068+ "md5": "529d5c4771d44c3d639b916dfe9110ee"
2069+ },
2070+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-image-generic-hwe-16.04_4.15.0.45.66_ppc64el.deb": {
2071+ "size": 2402,
2072+ "md5": "332d2d8f90f31e1b365913d6c62264a8"
2073+ },
2074+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-tools-4.15.0-45-generic_4.15.0-45.48~16.04.1_ppc64el.deb": {
2075+ "size": 1824,
2076+ "md5": "fd0daf1115eef6453787d7e85d5f174e"
2077+ },
2078+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/nfs-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_ppc64el.udeb": {
2079+ "size": 516676,
2080+ "md5": "b3b84cdd43c2446799c47ebb66a436c6"
2081+ },
2082+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/ppp-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_ppc64el.udeb": {
2083+ "size": 26128,
2084+ "md5": "4432ae1af0d10e985ad1026849019aca"
2085+ },
2086+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/kernel-image-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_ppc64el.udeb": {
2087+ "size": 6888884,
2088+ "md5": "f86a94b98ccea46afe7f60df0d5fd7b4"
2089+ }
2090+ }
2091+ },
2092+ "i386": {
2093+ "urls": {
2094+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-cloud-tools-virtual-hwe-16.04_4.15.0.45.66_i386.deb": {
2095+ "size": 2428,
2096+ "md5": "ae185e974e5c8d0e985efbdf99fbfa66"
2097+ },
2098+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/fat-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2099+ "size": 4186,
2100+ "md5": "9328819fc48119823b50f2fa24689030"
2101+ },
2102+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-image-generic-hwe-16.04_4.15.0.45.66_i386.deb": {
2103+ "size": 2434,
2104+ "md5": "f345dda4f86aef2bcdfd4b68b6c00573"
2105+ },
2106+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/pcmcia-storage-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2107+ "size": 71938,
2108+ "md5": "1711153824ba4889897b93d45725fdc2"
2109+ },
2110+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/md-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2111+ "size": 287612,
2112+ "md5": "fe5aed9e13052581ec6382b87a420d7e"
2113+ },
2114+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-tools-lowlatency-hwe-16.04_4.15.0.45.66_i386.deb": {
2115+ "size": 2400,
2116+ "md5": "3391ec9b32e9488f5f33348f46fa993f"
2117+ },
2118+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-headers-4.15.0-45-lowlatency_4.15.0-45.48~16.04.1_i386.deb": {
2119+ "size": 761216,
2120+ "md5": "80857bbb2a4a6db3cb4f916db71b98c1"
2121+ },
2122+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/nic-shared-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2123+ "size": 512820,
2124+ "md5": "a4cf09b433c31a1b9fb1362b25705706"
2125+ },
2126+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/multipath-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2127+ "size": 17874,
2128+ "md5": "395f0b00457dbb7a924a849388def6f3"
2129+ },
2130+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/nic-usb-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2131+ "size": 304558,
2132+ "md5": "630bc19b44eeca9630b2aa2c798d89e6"
2133+ },
2134+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/vlan-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2135+ "size": 25220,
2136+ "md5": "2a8e0f773a7f2803ef7d4acd3d1706f9"
2137+ },
2138+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-image-4.15.0-45-generic_4.15.0-45.48~16.04.1_i386.deb": {
2139+ "size": 7407690,
2140+ "md5": "3e56e6c3b15eca0b99297fabac08b7c9"
2141+ },
2142+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-tools-generic-hwe-16.04_4.15.0.45.66_i386.deb": {
2143+ "size": 2394,
2144+ "md5": "b7eac6b32d79bd37df5768d7e5d38f5a"
2145+ },
2146+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-headers-lowlatency-hwe-16.04_4.15.0.45.66_i386.deb": {
2147+ "size": 2394,
2148+ "md5": "d0fb49db3027158368f038f77d5a90db"
2149+ },
2150+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-image-lowlatency-hwe-16.04_4.15.0.45.66_i386.deb": {
2151+ "size": 2436,
2152+ "md5": "1c8550c32da1f4c1d9ffbc0b1fa8766a"
2153+ },
2154+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-tools-4.15.0-45-generic_4.15.0-45.48~16.04.1_i386.deb": {
2155+ "size": 1896,
2156+ "md5": "580b1439453707476ebcc8b28888d68c"
2157+ },
2158+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-buildinfo-4.15.0-45-generic_4.15.0-45.48~16.04.1_i386.deb": {
2159+ "size": 261988,
2160+ "md5": "a011d96ca0e850b23653316991cca697"
2161+ },
2162+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/kernel-image-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2163+ "size": 8269636,
2164+ "md5": "b5b29579bfb23f767b92c9d7a46ad5c2"
2165+ },
2166+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/ipmi-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2167+ "size": 59360,
2168+ "md5": "4e1ddfb9a54e9c176d663bfe40b4f135"
2169+ },
2170+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-generic-hwe-16.04_4.15.0.45.66_i386.deb": {
2171+ "size": 1802,
2172+ "md5": "75e6a2f7648cf0ebcd2b9577bbce4274"
2173+ },
2174+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/input-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2175+ "size": 413242,
2176+ "md5": "b0f534bb1d7e83bdd7fa74a9e3cc711f"
2177+ },
2178+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/virtio-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2179+ "size": 109430,
2180+ "md5": "15275b372671eb15a81c27de4000d137"
2181+ },
2182+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-cloud-tools-4.15.0-45-generic_4.15.0-45.48~16.04.1_i386.deb": {
2183+ "size": 1818,
2184+ "md5": "224324613f92a10b5fe3574aad196892"
2185+ },
2186+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-image-extra-virtual-hwe-16.04_4.15.0.45.66_i386.deb": {
2187+ "size": 1800,
2188+ "md5": "b9763ae4b5baee4025f6377c90557db7"
2189+ },
2190+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-hwe-tools-4.15.0-45_4.15.0-45.48~16.04.1_i386.deb": {
2191+ "size": 3473952,
2192+ "md5": "6341eb52826c130b453ee783db27b18e"
2193+ },
2194+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/scsi-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2195+ "size": 2506838,
2196+ "md5": "eed43042bf7ce3595ee4c7eaa7000b6c"
2197+ },
2198+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-tools-4.15.0-45-lowlatency_4.15.0-45.48~16.04.1_i386.deb": {
2199+ "size": 1904,
2200+ "md5": "2843a3e1a41d211ad689eac752bbac73"
2201+ },
2202+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/pcmcia-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2203+ "size": 77324,
2204+ "md5": "7fc34e7a02bff950c4d914ab56768808"
2205+ },
2206+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/message-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2207+ "size": 201998,
2208+ "md5": "5a1c1df8bb315021b01a07e4f0d8a583"
2209+ },
2210+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-hwe-cloud-tools-4.15.0-45_4.15.0-45.48~16.04.1_i386.deb": {
2211+ "size": 70638,
2212+ "md5": "b69a96b3f0d2dfde62106961b6fdacf4"
2213+ },
2214+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-cloud-tools-lowlatency-hwe-16.04_4.15.0.45.66_i386.deb": {
2215+ "size": 2412,
2216+ "md5": "4045145455a967c992a68a4210a619bb"
2217+ },
2218+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-headers-virtual-hwe-16.04_4.15.0.45.66_i386.deb": {
2219+ "size": 1778,
2220+ "md5": "dacae710e2e06dd12dc4838f86473298"
2221+ },
2222+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-modules-4.15.0-45-generic_4.15.0-45.48~16.04.1_i386.deb": {
2223+ "size": 11567646,
2224+ "md5": "fe88fc6400c78f447e471b0b7ed79695"
2225+ },
2226+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/irda-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2227+ "size": 206454,
2228+ "md5": "b9e16019374da600fc4ac54e5b04eb84"
2229+ },
2230+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/fs-core-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2231+ "size": 580434,
2232+ "md5": "8b4bd506002034f7ff07938568e08a27"
2233+ },
2234+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-headers-4.15.0-45-generic_4.15.0-45.48~16.04.1_i386.deb": {
2235+ "size": 762136,
2236+ "md5": "05ddfb68216ae19270f8875d8b2a3d7a"
2237+ },
2238+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/block-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2239+ "size": 360038,
2240+ "md5": "5646dec02516540439d090d97f166279"
2241+ },
2242+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/parport-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2243+ "size": 30690,
2244+ "md5": "d508aaec8de0c55162a35157cd2f242a"
2245+ },
2246+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-image-4.15.0-45-lowlatency_4.15.0-45.48~16.04.1_i386.deb": {
2247+ "size": 7440198,
2248+ "md5": "c55ccd8e642d9b592030014f55f6af66"
2249+ },
2250+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/sata-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2251+ "size": 92690,
2252+ "md5": "d6ef4a1c01facae300b3054052ba877e"
2253+ },
2254+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/firewire-core-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2255+ "size": 63006,
2256+ "md5": "755609eab7ccbbd767835896fb67bda6"
2257+ },
2258+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-buildinfo-4.15.0-45-lowlatency_4.15.0-45.48~16.04.1_i386.deb": {
2259+ "size": 262122,
2260+ "md5": "b0fa7887b450004ec9063e8d012c4331"
2261+ },
2262+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/nic-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2263+ "size": 4103472,
2264+ "md5": "e18e76f91de26f12398279fb695bd933"
2265+ },
2266+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-headers-generic-hwe-16.04_4.15.0.45.66_i386.deb": {
2267+ "size": 2394,
2268+ "md5": "31bbe4ba610cedbc2a512fc4f47ae509"
2269+ },
2270+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-lowlatency-hwe-16.04_4.15.0.45.66_i386.deb": {
2271+ "size": 1796,
2272+ "md5": "0ecca389664a980475e9462e787fbdd2"
2273+ },
2274+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/serial-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2275+ "size": 90864,
2276+ "md5": "7f25a04f0f34afe82136ff94855d9012"
2277+ },
2278+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/crypto-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2279+ "size": 265402,
2280+ "md5": "4914acf1380f69170eec38f33704e6b8"
2281+ },
2282+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-hwe-udebs-generic_4.15.0-45.48~16.04.1_i386.udeb": {
2283+ "size": 940,
2284+ "md5": "54c2dd70b73946aee48d428685875109"
2285+ },
2286+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-modules-extra-4.15.0-45-generic_4.15.0-45.48~16.04.1_i386.deb": {
2287+ "size": 31493224,
2288+ "md5": "61416d65a84c5637293f5ef47090dc57"
2289+ },
2290+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/usb-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2291+ "size": 135334,
2292+ "md5": "75c1ad427ccf4bc4037052e33f5b23c3"
2293+ },
2294+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-cloud-tools-4.15.0-45-lowlatency_4.15.0-45.48~16.04.1_i386.deb": {
2295+ "size": 1828,
2296+ "md5": "f2df07048bb160e64266d64a1ed5ece5"
2297+ },
2298+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/mouse-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2299+ "size": 57216,
2300+ "md5": "9c93fe4e1ebedada9578ea8d19f517c8"
2301+ },
2302+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/ppp-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2303+ "size": 24214,
2304+ "md5": "45d2ca0f34b305ed2096175595ad1fba"
2305+ },
2306+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/nic-pcmcia-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2307+ "size": 139354,
2308+ "md5": "4ad36c5d10a72a903cd1d11c080c9bbd"
2309+ },
2310+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/fb-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2311+ "size": 12698,
2312+ "md5": "5fc160ef551b477a247113a440a40f82"
2313+ },
2314+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/pata-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2315+ "size": 129542,
2316+ "md5": "a901c6f1e1c9c3a472be0109015a9575"
2317+ },
2318+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/floppy-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2319+ "size": 31546,
2320+ "md5": "0bff1dbb603ddc9ce962571c34a1e168"
2321+ },
2322+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-modules-4.15.0-45-lowlatency_4.15.0-45.48~16.04.1_i386.deb": {
2323+ "size": 43221838,
2324+ "md5": "bdd0f25ddcebc79b2b07f6a533dbdab7"
2325+ },
2326+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-virtual-hwe-16.04_4.15.0.45.66_i386.deb": {
2327+ "size": 1794,
2328+ "md5": "30b5bfec0bd3cefc149ec1dab5ee5932"
2329+ },
2330+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/plip-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2331+ "size": 8532,
2332+ "md5": "cd199b2b90e7fb74ac4ff38ad79b874b"
2333+ },
2334+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-cloud-tools-generic-hwe-16.04_4.15.0.45.66_i386.deb": {
2335+ "size": 2404,
2336+ "md5": "3f052cd26691ff4b5a5b2192894a1c65"
2337+ },
2338+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/nfs-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2339+ "size": 485254,
2340+ "md5": "9001fb07a48bea640807039d1e3992b0"
2341+ },
2342+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/fs-secondary-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2343+ "size": 720030,
2344+ "md5": "26e3c71e5bb288b2e823a1e5f4b67e88"
2345+ },
2346+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/storage-core-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_i386.udeb": {
2347+ "size": 44222,
2348+ "md5": "3e4f76e279d7756eb00c0edf4ad73517"
2349+ },
2350+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-image-virtual-hwe-16.04_4.15.0.45.66_i386.deb": {
2351+ "size": 2404,
2352+ "md5": "c616248f59feff6004b7ceddb3be737d"
2353+ },
2354+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-tools-virtual-hwe-16.04_4.15.0.45.66_i386.deb": {
2355+ "size": 2412,
2356+ "md5": "947b648c55e8dd1b2b0f5772dcb55a39"
2357+ }
2358+ }
2359+ },
2360+ "source": {
2361+ "urls": {
2362+ "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-aws-hwe/linux-aws-hwe_4.15.0.orig.tar.gz": {
2363+ "size": 157656459,
2364+ "md5": "dd5a75343cd956de12e8d26e1805ca92"
2365+ },
2366+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-hwe_4.15.0-45.48~16.04.1.diff.gz": {
2367+ "size": 10684363,
2368+ "md5": "462ddec260aa87efb88a1c5dad0ee377"
2369+ },
2370+ "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-meta-aws-hwe/linux-meta-aws-hwe_4.15.0.1032.33.tar.gz": {
2371+ "size": 5483,
2372+ "md5": "ce3abc1e513fcc828ec8541fa5eabd0f"
2373+ },
2374+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-gcp/linux-meta-gcp_4.15.0.1027.41.tar.xz": {
2375+ "size": 7004,
2376+ "md5": "9ebc566d03e1fd6e48ff302cdbb2fc1d"
2377+ },
2378+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-signed-gcp/linux-signed-gcp_4.15.0-1027.28~16.04.1.tar.xz": {
2379+ "size": 8772,
2380+ "md5": "361cc4fb09cd6a93aace21f3c2a87a30"
2381+ },
2382+ "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-meta-aws-hwe/linux-meta-aws-hwe_4.15.0.1032.33.dsc": {
2383+ "size": 1656,
2384+ "md5": "627f795939e7a8c3da2463fedeb4cb9e"
2385+ },
2386+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-gcp/linux-gcp_4.15.0-1027.28~16.04.1.diff.gz": {
2387+ "size": 9692904,
2388+ "md5": "af41d267717145856f331db0ca4f9937"
2389+ },
2390+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-signed-hwe/linux-signed-hwe_4.15.0-45.48~16.04.1.tar.xz": {
2391+ "size": 10292,
2392+ "md5": "d428a7827f60349ce029fa0193d04585"
2393+ },
2394+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-meta-hwe_4.15.0.45.66.dsc": {
2395+ "size": 4358,
2396+ "md5": "ff8590e6b717cf439ea3fa0f84bf00fd"
2397+ },
2398+ "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-aws-hwe/linux-aws-hwe_4.15.0-1032.34~16.04.1.dsc": {
2399+ "size": 3819,
2400+ "md5": "f57142624d8fa8dd0e791e58b45b4800"
2401+ },
2402+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-gcp/linux-gcp_4.15.0-1027.28~16.04.1.dsc": {
2403+ "size": 3399,
2404+ "md5": "c06d4a8505fe3e5cca7966a52f9c531c"
2405+ },
2406+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-gcp/linux-gcp_4.15.0.orig.tar.gz": {
2407+ "size": 157656459,
2408+ "md5": "dd5a75343cd956de12e8d26e1805ca92"
2409+ },
2410+ "http://security.ubuntu.com/ubuntu/pool/universe/l/linux-aws-hwe/linux-aws-hwe_4.15.0-1032.34~16.04.1.diff.gz": {
2411+ "size": 10023040,
2412+ "md5": "c87d20cfca4b62655cb566177bfcc6cc"
2413+ },
2414+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-hwe/linux-meta-hwe_4.15.0.45.66.tar.xz": {
2415+ "size": 8240,
2416+ "md5": "ba99ec3bcf80406f12e579a210f3bf8a"
2417+ },
2418+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-signed-hwe/linux-signed-hwe_4.15.0-45.48~16.04.1.dsc": {
2419+ "size": 1829,
2420+ "md5": "e3061d1a743146a5e44ecef6918c818a"
2421+ },
2422+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-hwe_4.15.0.orig.tar.gz": {
2423+ "size": 157656459,
2424+ "md5": "dd5a75343cd956de12e8d26e1805ca92"
2425+ },
2426+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-gcp/linux-meta-gcp_4.15.0.1027.41.dsc": {
2427+ "size": 1884,
2428+ "md5": "24451c097e59cd640ea2b48997b2359a"
2429+ },
2430+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-signed-gcp/linux-signed-gcp_4.15.0-1027.28~16.04.1.dsc": {
2431+ "size": 1479,
2432+ "md5": "3fdb6cb88e7b3ec4a9041f472574783a"
2433+ },
2434+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-hwe/linux-hwe_4.15.0-45.48~16.04.1.dsc": {
2435+ "size": 6511,
2436+ "md5": "ca33c38b61c25c439cfd5fe6e0de778e"
2437+ }
2438+ }
2439+ },
2440+ "s390x": {
2441+ "urls": {
2442+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/dasd-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_s390x.udeb": {
2443+ "size": 93528,
2444+ "md5": "2acc11d055e084cf8848363c056b5bb0"
2445+ },
2446+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-image-extra-virtual-hwe-16.04_4.15.0.45.66_s390x.deb": {
2447+ "size": 1798,
2448+ "md5": "034123b0728f4d4552253dd905625b98"
2449+ },
2450+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-image-generic-hwe-16.04_4.15.0.45.66_s390x.deb": {
2451+ "size": 2406,
2452+ "md5": "04e6b14c2e2264396f9939efacc693dc"
2453+ },
2454+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/fs-core-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_s390x.udeb": {
2455+ "size": 1167450,
2456+ "md5": "f5d1a086eaf16fb377f3a31e40de5a2d"
2457+ },
2458+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/nic-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_s390x.udeb": {
2459+ "size": 695920,
2460+ "md5": "e8b06a00c16f99298671dec997eaa710"
2461+ },
2462+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-hwe-udebs-generic_4.15.0-45.48~16.04.1_s390x.udeb": {
2463+ "size": 864,
2464+ "md5": "62b1df89c06f9ca433312e8d972a2261"
2465+ },
2466+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/fs-secondary-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_s390x.udeb": {
2467+ "size": 691774,
2468+ "md5": "aabc0c3eb040086cebbac4514f1b50dc"
2469+ },
2470+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-tools-generic-hwe-16.04_4.15.0.45.66_s390x.deb": {
2471+ "size": 2396,
2472+ "md5": "852413137244106987788752df79a95d"
2473+ },
2474+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-headers-virtual-hwe-16.04_4.15.0.45.66_s390x.deb": {
2475+ "size": 1778,
2476+ "md5": "e7076f27786d32352e3f72a905c2cae5"
2477+ },
2478+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-tools-4.15.0-45-generic_4.15.0-45.48~16.04.1_s390x.deb": {
2479+ "size": 1828,
2480+ "md5": "d4e216b11a460adafaab2b424a4e22ae"
2481+ },
2482+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/nfs-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_s390x.udeb": {
2483+ "size": 532002,
2484+ "md5": "4c3f9e21f9d7583a1911cebd01c1b23d"
2485+ },
2486+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/storage-core-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_s390x.udeb": {
2487+ "size": 19508,
2488+ "md5": "4c52df5619ef451d4bb3d53a55bd13df"
2489+ },
2490+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/md-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_s390x.udeb": {
2491+ "size": 281286,
2492+ "md5": "e7fcbcf0b577e9b0957b4e35e1318e74"
2493+ },
2494+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/nic-shared-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_s390x.udeb": {
2495+ "size": 4596,
2496+ "md5": "c3fa728338e369bfe762a60e986e19d2"
2497+ },
2498+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-buildinfo-4.15.0-45-generic_4.15.0-45.48~16.04.1_s390x.deb": {
2499+ "size": 136084,
2500+ "md5": "bc42a315441878c427a5fa8f633df8c1"
2501+ },
2502+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/kernel-image-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_s390x.udeb": {
2503+ "size": 4790162,
2504+ "md5": "ba162504cbf32683a1dadf0b83ec825e"
2505+ },
2506+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/fat-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_s390x.udeb": {
2507+ "size": 4844,
2508+ "md5": "1327b22933daa6fa6ad596546ab899a4"
2509+ },
2510+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-image-4.15.0-45-generic_4.15.0-45.48~16.04.1_s390x.deb": {
2511+ "size": 4429706,
2512+ "md5": "ae8526980cbf53f7f71e4c8d14827075"
2513+ },
2514+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-headers-4.15.0-45-generic_4.15.0-45.48~16.04.1_s390x.deb": {
2515+ "size": 428050,
2516+ "md5": "510f7091b00a9808de85a0388322b757"
2517+ },
2518+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-generic-hwe-16.04_4.15.0.45.66_s390x.deb": {
2519+ "size": 1804,
2520+ "md5": "a3e6f8656ba181af73defca0ff14f5cb"
2521+ },
2522+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-headers-generic-hwe-16.04_4.15.0.45.66_s390x.deb": {
2523+ "size": 2392,
2524+ "md5": "31911b0bee704986ff140010f1aa75de"
2525+ },
2526+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/crypto-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_s390x.udeb": {
2527+ "size": 267762,
2528+ "md5": "7d30f3eebb2204132a098d3809695cca"
2529+ },
2530+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-virtual-hwe-16.04_4.15.0.45.66_s390x.deb": {
2531+ "size": 1794,
2532+ "md5": "2fe2782e93c6c244ac5faaf3e6d0ffa4"
2533+ },
2534+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/virtio-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_s390x.udeb": {
2535+ "size": 11182,
2536+ "md5": "0a38b0aed473e7f94c0846f43ec23e50"
2537+ },
2538+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-modules-4.15.0-45-generic_4.15.0-45.48~16.04.1_s390x.deb": {
2539+ "size": 8138040,
2540+ "md5": "c2cf58f2a1e744984498da52838da782"
2541+ },
2542+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/scsi-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_s390x.udeb": {
2543+ "size": 873144,
2544+ "md5": "330f2aaf05e88e8e7bbbe1a04146a5be"
2545+ },
2546+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/vlan-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_s390x.udeb": {
2547+ "size": 28348,
2548+ "md5": "917df55c876bec932751b697745ee951"
2549+ },
2550+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-image-virtual-hwe-16.04_4.15.0.45.66_s390x.deb": {
2551+ "size": 2406,
2552+ "md5": "4a623f4f6a16edb33ca05387db9eb22c"
2553+ },
2554+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/block-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_s390x.udeb": {
2555+ "size": 69374,
2556+ "md5": "07cff607e1424ba1a5ec73c46b0a9fcd"
2557+ },
2558+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/dasd-extra-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_s390x.udeb": {
2559+ "size": 7384,
2560+ "md5": "df69009ebf76b9007eb2aceb9fa504ea"
2561+ },
2562+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/multipath-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_s390x.udeb": {
2563+ "size": 20764,
2564+ "md5": "098357afc5bc90873d88cbd511986a2e"
2565+ },
2566+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-modules-extra-4.15.0-45-generic_4.15.0-45.48~16.04.1_s390x.deb": {
2567+ "size": 2649290,
2568+ "md5": "ad29286ec8977629c604ec4aa220da89"
2569+ },
2570+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-hwe-tools-4.15.0-45_4.15.0-45.48~16.04.1_s390x.deb": {
2571+ "size": 3228120,
2572+ "md5": "7a0746c71541e2a16309d96e10991c20"
2573+ },
2574+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-tools-virtual-hwe-16.04_4.15.0.45.66_s390x.deb": {
2575+ "size": 2414,
2576+ "md5": "b4bcdcf16fb018d424549d9988a3e476"
2577+ }
2578+ }
2579+ },
2580+ "armhf": {
2581+ "urls": {
2582+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-hwe-udebs-generic_4.15.0-45.48~16.04.1_armhf.udeb": {
2583+ "size": 898,
2584+ "md5": "9c8b87bc71426c2c2021340f4d83e442"
2585+ },
2586+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/fat-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2587+ "size": 4648,
2588+ "md5": "831ea419d3b271c3beecb8f1874d9500"
2589+ },
2590+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/storage-core-modules-4.15.0-45-generic-lpae-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2591+ "size": 54074,
2592+ "md5": "473655fbcf01e52fd2f32f422bb7b7da"
2593+ },
2594+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-image-generic-hwe-16.04_4.15.0.45.66_armhf.deb": {
2595+ "size": 2394,
2596+ "md5": "271a2ed1aa09d97ee5706f839f68e5b6"
2597+ },
2598+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/irda-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2599+ "size": 176084,
2600+ "md5": "0e01f4e5b3a3ac3e0439b80b95f89576"
2601+ },
2602+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-hwe-udebs-generic-lpae_4.15.0-45.48~16.04.1_armhf.udeb": {
2603+ "size": 898,
2604+ "md5": "3dd1b952373bef7337a34b1410277db9"
2605+ },
2606+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/parport-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2607+ "size": 30104,
2608+ "md5": "b7c98daade6fe4f4f49e0fafe9232976"
2609+ },
2610+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/storage-core-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2611+ "size": 54012,
2612+ "md5": "e6c02ccf0dad301b718e0d5defb41aa7"
2613+ },
2614+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/usb-modules-4.15.0-45-generic-lpae-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2615+ "size": 93982,
2616+ "md5": "4bba45b9f327b878dea88cbd785d6c98"
2617+ },
2618+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/nic-usb-modules-4.15.0-45-generic-lpae-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2619+ "size": 313546,
2620+ "md5": "99ab0c439d9a9886c537d50c1370392d"
2621+ },
2622+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/scsi-modules-4.15.0-45-generic-lpae-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2623+ "size": 2233696,
2624+ "md5": "7b0d1354183d97f699e380f727dee6b0"
2625+ },
2626+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/md-modules-4.15.0-45-generic-lpae-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2627+ "size": 286742,
2628+ "md5": "b255e23f99c6e5b4dccb7cdeee41b796"
2629+ },
2630+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-buildinfo-4.15.0-45-generic_4.15.0-45.48~16.04.1_armhf.deb": {
2631+ "size": 257216,
2632+ "md5": "cb30895e9dead787a4cb32e93db5468f"
2633+ },
2634+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/vlan-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2635+ "size": 25594,
2636+ "md5": "a9e69ff84a356fe2eafc43e6379fd78d"
2637+ },
2638+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-generic-lpae-hwe-16.04_4.15.0.45.66_armhf.deb": {
2639+ "size": 1818,
2640+ "md5": "e4674cfd39d5a24e12ee7e6c70f726e8"
2641+ },
2642+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/mouse-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2643+ "size": 53818,
2644+ "md5": "9c353c377fadd65708cbce704eda125a"
2645+ },
2646+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/crypto-modules-4.15.0-45-generic-lpae-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2647+ "size": 260764,
2648+ "md5": "bfbeeb070943170305967b88c9c5794f"
2649+ },
2650+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/fs-secondary-modules-4.15.0-45-generic-lpae-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2651+ "size": 698478,
2652+ "md5": "e69987160d85161c22e8e8740f56b55b"
2653+ },
2654+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/plip-modules-4.15.0-45-generic-lpae-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2655+ "size": 8566,
2656+ "md5": "3c44a6661788e94082cb0e2db03c3d3b"
2657+ },
2658+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/nic-shared-modules-4.15.0-45-generic-lpae-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2659+ "size": 515870,
2660+ "md5": "6f139b671269f7badb80c40dde4c6899"
2661+ },
2662+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/sata-modules-4.15.0-45-generic-lpae-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2663+ "size": 85478,
2664+ "md5": "095f763fba3879f38a327e708f967808"
2665+ },
2666+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-hwe-tools-4.15.0-45_4.15.0-45.48~16.04.1_armhf.deb": {
2667+ "size": 3273624,
2668+ "md5": "1995438e806f1b1976579ff2982bb77f"
2669+ },
2670+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/input-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2671+ "size": 380492,
2672+ "md5": "03661461c218fce824bc7a3a6ba93ce6"
2673+ },
2674+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/crypto-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2675+ "size": 260058,
2676+ "md5": "eb25b16eae1e33128fa8f923b1e32076"
2677+ },
2678+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/nic-usb-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2679+ "size": 313010,
2680+ "md5": "fa9cfa1f51eb9d14f215f8688ced579c"
2681+ },
2682+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/usb-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2683+ "size": 102408,
2684+ "md5": "b5170317067433b90f7e210fb78d1922"
2685+ },
2686+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/ipmi-modules-4.15.0-45-generic-lpae-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2687+ "size": 59894,
2688+ "md5": "8b82645ed5a2e965a8850a8ebfc4c2a0"
2689+ },
2690+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-image-4.15.0-45-generic_4.15.0-45.48~16.04.1_armhf.deb": {
2691+ "size": 8180036,
2692+ "md5": "5672f7cda24c09eaeca409198f5e30b5"
2693+ },
2694+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/nic-shared-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2695+ "size": 511966,
2696+ "md5": "4205d213985b2287ae9de43e782f9f83"
2697+ },
2698+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/plip-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2699+ "size": 8568,
2700+ "md5": "0e8ace3d06df3a294dfa78be33760287"
2701+ },
2702+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/scsi-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2703+ "size": 2231156,
2704+ "md5": "0897b90a163a5cc70eeb9411c2fa2b73"
2705+ },
2706+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/sata-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2707+ "size": 85228,
2708+ "md5": "d56c188e30e06892e953049876d4d22e"
2709+ },
2710+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-tools-4.15.0-45-generic-lpae_4.15.0-45.48~16.04.1_armhf.deb": {
2711+ "size": 1836,
2712+ "md5": "5cf90d3f742dbd9931f3e7e2e6c93b8b"
2713+ },
2714+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/parport-modules-4.15.0-45-generic-lpae-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2715+ "size": 30178,
2716+ "md5": "995c57153fdc0de5dd8d3e8521bd678e"
2717+ },
2718+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/block-modules-4.15.0-45-generic-lpae-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2719+ "size": 303652,
2720+ "md5": "3939c73dc1fd89645d5a97ee9e7790f7"
2721+ },
2722+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/nic-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2723+ "size": 4016468,
2724+ "md5": "9ef2d03dff05bca2f1d6fb99666cc735"
2725+ },
2726+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-headers-generic-hwe-16.04_4.15.0.45.66_armhf.deb": {
2727+ "size": 2386,
2728+ "md5": "42b993e49af7715f7af090ad046f81db"
2729+ },
2730+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-generic-hwe-16.04_4.15.0.45.66_armhf.deb": {
2731+ "size": 1802,
2732+ "md5": "244b7e8af289fa1f76d71c56bd4b5b91"
2733+ },
2734+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/vlan-modules-4.15.0-45-generic-lpae-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2735+ "size": 25538,
2736+ "md5": "c6d770bce34524eb30ee2093d21ffd4a"
2737+ },
2738+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/multipath-modules-4.15.0-45-generic-lpae-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2739+ "size": 18924,
2740+ "md5": "3c2d11cdebbef924237740a8a9671d29"
2741+ },
2742+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/nfs-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2743+ "size": 499184,
2744+ "md5": "45452ec3ba0771aefc9cc7dd768638d5"
2745+ },
2746+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-tools-generic-hwe-16.04_4.15.0.45.66_armhf.deb": {
2747+ "size": 2396,
2748+ "md5": "4aab7df96f143e6e0cb02ed36eb4a4a0"
2749+ },
2750+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/ipmi-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2751+ "size": 59666,
2752+ "md5": "d682d7f9f66b3aa7024b451a245b881b"
2753+ },
2754+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/mouse-modules-4.15.0-45-generic-lpae-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2755+ "size": 53924,
2756+ "md5": "bfd1a811e495ac502926d4455b6f8f2f"
2757+ },
2758+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-image-generic-lpae-hwe-16.04_4.15.0.45.66_armhf.deb": {
2759+ "size": 2412,
2760+ "md5": "ac832de1f6900ee1b3b9469b7ad76403"
2761+ },
2762+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-headers-generic-lpae-hwe-16.04_4.15.0.45.66_armhf.deb": {
2763+ "size": 2400,
2764+ "md5": "467cb41fb3ed39b51eab11628d2fd2fc"
2765+ },
2766+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/multipath-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2767+ "size": 18902,
2768+ "md5": "d2a5d358a68ad458300bc1b14ff0a935"
2769+ },
2770+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/fat-modules-4.15.0-45-generic-lpae-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2771+ "size": 4744,
2772+ "md5": "78c96bd25d58c7d7b03ef745addb35c2"
2773+ },
2774+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-tools-4.15.0-45-generic_4.15.0-45.48~16.04.1_armhf.deb": {
2775+ "size": 1824,
2776+ "md5": "41a40368d9fe7075a3bfb03b100712e9"
2777+ },
2778+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-headers-4.15.0-45-generic_4.15.0-45.48~16.04.1_armhf.deb": {
2779+ "size": 780838,
2780+ "md5": "56d4d9b5aef2d94ead5161c5a567535e"
2781+ },
2782+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/nic-modules-4.15.0-45-generic-lpae-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2783+ "size": 4024998,
2784+ "md5": "b9889a380c7526d6ddeb6b81deb04fd4"
2785+ },
2786+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-modules-4.15.0-45-generic_4.15.0-45.48~16.04.1_armhf.deb": {
2787+ "size": 43320910,
2788+ "md5": "3ef07af2c0e542a1ea8a7093a22aed68"
2789+ },
2790+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/fs-core-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2791+ "size": 575986,
2792+ "md5": "2b02bd6e7ce127a666283544e04eb986"
2793+ },
2794+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/input-modules-4.15.0-45-generic-lpae-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2795+ "size": 392032,
2796+ "md5": "d91336a8556e4796cf7ed8136d5dca2d"
2797+ },
2798+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/kernel-image-4.15.0-45-generic-lpae-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2799+ "size": 9304734,
2800+ "md5": "e684782fddd24c46d12f3cc04e3bfd53"
2801+ },
2802+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-image-4.15.0-45-generic-lpae_4.15.0-45.48~16.04.1_armhf.deb": {
2803+ "size": 8027214,
2804+ "md5": "bc45ac41f264058fdc71a3481378e169"
2805+ },
2806+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/fs-core-modules-4.15.0-45-generic-lpae-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2807+ "size": 574818,
2808+ "md5": "56a3666caf0848f9077e432a77dd530f"
2809+ },
2810+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/ppp-modules-4.15.0-45-generic-lpae-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2811+ "size": 24794,
2812+ "md5": "107b9bb10b8ec1a8299ef00379e7df3e"
2813+ },
2814+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/md-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2815+ "size": 286834,
2816+ "md5": "d1e7d91710b9f85543c76fc0495677cf"
2817+ },
2818+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-headers-4.15.0-45-generic-lpae_4.15.0-45.48~16.04.1_armhf.deb": {
2819+ "size": 770612,
2820+ "md5": "de2e5f284b581ef7d68195e4fb0586d6"
2821+ },
2822+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/nfs-modules-4.15.0-45-generic-lpae-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2823+ "size": 501552,
2824+ "md5": "d4512cb31ae6e5605dc6da9eb1d23e02"
2825+ },
2826+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-modules-4.15.0-45-generic-lpae_4.15.0-45.48~16.04.1_armhf.deb": {
2827+ "size": 42324576,
2828+ "md5": "b8460b583e83a54fd4045e0f53e45d2b"
2829+ },
2830+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/fs-secondary-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2831+ "size": 700190,
2832+ "md5": "240997123488db6877bb0d18127f19b7"
2833+ },
2834+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/block-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2835+ "size": 305932,
2836+ "md5": "06fa3b9d285126387100cfc11bb36c89"
2837+ },
2838+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/kernel-image-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2839+ "size": 10479380,
2840+ "md5": "b140aae4798f1f892f63508748aa5afc"
2841+ },
2842+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/ppp-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2843+ "size": 24902,
2844+ "md5": "163703caea1bcd92a2f77fdbc57e730f"
2845+ },
2846+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/irda-modules-4.15.0-45-generic-lpae-di_4.15.0-45.48~16.04.1_armhf.udeb": {
2847+ "size": 176642,
2848+ "md5": "85dcef6e12bb0177e337e90732b07a7b"
2849+ },
2850+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-buildinfo-4.15.0-45-generic-lpae_4.15.0-45.48~16.04.1_armhf.deb": {
2851+ "size": 254866,
2852+ "md5": "456cde9ab0a73dbbe489e5ba26b06871"
2853+ },
2854+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-tools-generic-lpae-hwe-16.04_4.15.0.45.66_armhf.deb": {
2855+ "size": 2404,
2856+ "md5": "cdc5f3a429f9c5d425c2fbcc96da0db9"
2857+ }
2858+ }
2859+ },
2860+ "arm64": {
2861+ "urls": {
2862+ "http://ports.ubuntu.com/pool/universe/l/linux-meta-aws-hwe/linux-tools-aws-hwe_4.15.0.1032.33_arm64.deb": {
2863+ "size": 2276,
2864+ "md5": "12bee50dfa0af5484946e9adb6f8feba"
2865+ },
2866+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/ipmi-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_arm64.udeb": {
2867+ "size": 62048,
2868+ "md5": "a6e1762fb3852ca837bb26b1f8db2181"
2869+ },
2870+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-hwe-udebs-generic_4.15.0-45.48~16.04.1_arm64.udeb": {
2871+ "size": 906,
2872+ "md5": "b064535483fb0866c7378a46cde26ab8"
2873+ },
2874+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/crypto-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_arm64.udeb": {
2875+ "size": 249722,
2876+ "md5": "eac0f79d63a93bc1278196d31c71ce9a"
2877+ },
2878+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/nfs-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_arm64.udeb": {
2879+ "size": 493702,
2880+ "md5": "27b616b310fde7c7d10fa1f61f08ccd3"
2881+ },
2882+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/kernel-image-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_arm64.udeb": {
2883+ "size": 9051050,
2884+ "md5": "cdc54b3559f1e058195c39df53d09be1"
2885+ },
2886+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/plip-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_arm64.udeb": {
2887+ "size": 8382,
2888+ "md5": "8618269b521bd03347e88d090a0d7ddc"
2889+ },
2890+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/multipath-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_arm64.udeb": {
2891+ "size": 18314,
2892+ "md5": "ec6ef0872c2d4ecd2cf3b5dd48ec6976"
2893+ },
2894+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/vlan-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_arm64.udeb": {
2895+ "size": 25366,
2896+ "md5": "52951eb8dfe9bde42dcfc5b46c2ee0ed"
2897+ },
2898+ "http://ports.ubuntu.com/pool/universe/l/linux-aws-hwe/linux-buildinfo-4.15.0-1032-aws_4.15.0-1032.34~16.04.1_arm64.deb": {
2899+ "size": 227318,
2900+ "md5": "f740fd265224d3f36c19739e22149d35"
2901+ },
2902+ "http://ports.ubuntu.com/pool/universe/l/linux-meta-aws-hwe/linux-headers-aws-hwe_4.15.0.1032.33_arm64.deb": {
2903+ "size": 2270,
2904+ "md5": "71bdd9a047c4e8fc9eca0b5821584652"
2905+ },
2906+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/fs-core-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_arm64.udeb": {
2907+ "size": 1275630,
2908+ "md5": "69f449e67c335eb8a2b4f797beffb4d9"
2909+ },
2910+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/fs-secondary-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_arm64.udeb": {
2911+ "size": 664002,
2912+ "md5": "86a29db9c86cfdccae1adb569bc001e2"
2913+ },
2914+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/nic-shared-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_arm64.udeb": {
2915+ "size": 523206,
2916+ "md5": "e039c5fed44103ea1191bd621aaa1609"
2917+ },
2918+ "http://ports.ubuntu.com/pool/universe/l/linux-aws-hwe/linux-aws-hwe-cloud-tools-4.15.0-1032_4.15.0-1032.34~16.04.1_arm64.deb": {
2919+ "size": 50498,
2920+ "md5": "d2f384e1e42fdf3d8f9ac61bc824ffc3"
2921+ },
2922+ "http://ports.ubuntu.com/pool/universe/l/linux-aws-hwe/linux-modules-4.15.0-1032-aws_4.15.0-1032.34~16.04.1_arm64.deb": {
2923+ "size": 11508880,
2924+ "md5": "55b7d97b82e056b4484cf059f48b751a"
2925+ },
2926+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-virtual-hwe-16.04_4.15.0.45.66_arm64.deb": {
2927+ "size": 1796,
2928+ "md5": "a081442b5f2ed8d7a988482f47b735e1"
2929+ },
2930+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/nic-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_arm64.udeb": {
2931+ "size": 4247492,
2932+ "md5": "437c55211515ac9a85d7a00e6e22201c"
2933+ },
2934+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-generic-hwe-16.04_4.15.0.45.66_arm64.deb": {
2935+ "size": 1800,
2936+ "md5": "6d1397b27a2337d070f7238d2194741b"
2937+ },
2938+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-headers-generic-hwe-16.04_4.15.0.45.66_arm64.deb": {
2939+ "size": 2390,
2940+ "md5": "9f73a8b32b3f55e22f2b5a47bd234c75"
2941+ },
2942+ "http://ports.ubuntu.com/pool/universe/l/linux-meta-aws-hwe/linux-aws-hwe_4.15.0.1032.33_arm64.deb": {
2943+ "size": 1802,
2944+ "md5": "67566b5bd055b17b6af358a95b5197a4"
2945+ },
2946+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/block-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_arm64.udeb": {
2947+ "size": 260564,
2948+ "md5": "c6beb0c9f72d64f4451a91d4546762a7"
2949+ },
2950+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-tools-4.15.0-45-generic_4.15.0-45.48~16.04.1_arm64.deb": {
2951+ "size": 1818,
2952+ "md5": "e76ab33e7517e0fc9bd0051b9888f422"
2953+ },
2954+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/nic-usb-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_arm64.udeb": {
2955+ "size": 311466,
2956+ "md5": "50a8da0caf76d5b62129ee1aec02a05b"
2957+ },
2958+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/usb-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_arm64.udeb": {
2959+ "size": 108226,
2960+ "md5": "f76d734006a75ef28b751cf480d3926b"
2961+ },
2962+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-tools-generic-hwe-16.04_4.15.0.45.66_arm64.deb": {
2963+ "size": 2394,
2964+ "md5": "ed45526e6da97fcaf14d6d3228f47ad8"
2965+ },
2966+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/md-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_arm64.udeb": {
2967+ "size": 272674,
2968+ "md5": "ee97d512123836b89b6f5d8ae02e01b1"
2969+ },
2970+ "http://ports.ubuntu.com/pool/universe/l/linux-aws-hwe/linux-cloud-tools-4.15.0-1032-aws_4.15.0-1032.34~16.04.1_arm64.deb": {
2971+ "size": 1828,
2972+ "md5": "65f83d23c5741f3a7c54355d8ba9e248"
2973+ },
2974+ "http://ports.ubuntu.com/pool/universe/l/linux-aws-hwe/linux-image-4.15.0-1032-aws_4.15.0-1032.34~16.04.1_arm64.deb": {
2975+ "size": 8048884,
2976+ "md5": "3e2e5da610e7a3b70535211f0db2a69f"
2977+ },
2978+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/scsi-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_arm64.udeb": {
2979+ "size": 2211948,
2980+ "md5": "2520aad4b023b18c4e10b0523eaa48da"
2981+ },
2982+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-modules-4.15.0-45-generic_4.15.0-45.48~16.04.1_arm64.deb": {
2983+ "size": 11719302,
2984+ "md5": "4468f34d0e44310dbee1dc3494c8c24b"
2985+ },
2986+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/storage-core-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_arm64.udeb": {
2987+ "size": 53124,
2988+ "md5": "3545c1a61e58cac1d4c7ef8e33db2654"
2989+ },
2990+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/sata-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_arm64.udeb": {
2991+ "size": 106920,
2992+ "md5": "37a7696316160dd0206f8c54ca25fc39"
2993+ },
2994+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/virtio-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_arm64.udeb": {
2995+ "size": 10038,
2996+ "md5": "3b062d76f36393730232c826cccb81e3"
2997+ },
2998+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-headers-virtual-hwe-16.04_4.15.0.45.66_arm64.deb": {
2999+ "size": 1782,
3000+ "md5": "295982f8dde4795466abfae70c09dca6"
3001+ },
3002+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-image-4.15.0-45-generic_4.15.0-45.48~16.04.1_arm64.deb": {
3003+ "size": 8029456,
3004+ "md5": "485bc6261cb56adf7a862a911c3aafd9"
3005+ },
3006+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/ppp-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_arm64.udeb": {
3007+ "size": 26964,
3008+ "md5": "7152d8b9a0335a7bbdf0b2326dab3e02"
3009+ },
3010+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/mouse-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_arm64.udeb": {
3011+ "size": 54008,
3012+ "md5": "c509840ca3e16da90ea28de87de9981a"
3013+ },
3014+ "http://ports.ubuntu.com/pool/universe/l/linux-meta-aws-hwe/linux-aws-edge_4.15.0.1032.33_arm64.deb": {
3015+ "size": 1778,
3016+ "md5": "ac5436ffca11c5ebd7c1d10c769c0645"
3017+ },
3018+ "http://ports.ubuntu.com/pool/universe/l/linux-meta-aws-hwe/linux-image-aws-hwe_4.15.0.1032.33_arm64.deb": {
3019+ "size": 2268,
3020+ "md5": "6da71cd66e711cfc2cfd4e832e82f3af"
3021+ },
3022+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-hwe-tools-4.15.0-45_4.15.0-45.48~16.04.1_arm64.deb": {
3023+ "size": 3404944,
3024+ "md5": "adfcd38b6124fd3525e593fc59f52421"
3025+ },
3026+ "http://ports.ubuntu.com/pool/universe/l/linux-aws-hwe/linux-headers-4.15.0-1032-aws_4.15.0-1032.34~16.04.1_arm64.deb": {
3027+ "size": 729630,
3028+ "md5": "ceb4296ba75654a546541a5a7e582861"
3029+ },
3030+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/input-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_arm64.udeb": {
3031+ "size": 408148,
3032+ "md5": "9499d06bea5a864f583dd8977c274abf"
3033+ },
3034+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/fat-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_arm64.udeb": {
3035+ "size": 4632,
3036+ "md5": "cb019468706f08e2564adb8be9b3dd10"
3037+ },
3038+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-buildinfo-4.15.0-45-generic_4.15.0-45.48~16.04.1_arm64.deb": {
3039+ "size": 256378,
3040+ "md5": "979a5e0b5ddf08f7ed097ea5ccbeceba"
3041+ },
3042+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-image-generic-hwe-16.04_4.15.0.45.66_arm64.deb": {
3043+ "size": 2408,
3044+ "md5": "bf4a76cfc09162e352ef025be3304237"
3045+ },
3046+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-modules-extra-4.15.0-45-generic_4.15.0-45.48~16.04.1_arm64.deb": {
3047+ "size": 31536912,
3048+ "md5": "b94e869f399e6630597e2b1d4407187b"
3049+ },
3050+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-image-virtual-hwe-16.04_4.15.0.45.66_arm64.deb": {
3051+ "size": 2406,
3052+ "md5": "9e3cc7124b3630ecf28f6802695de21e"
3053+ },
3054+ "http://ports.ubuntu.com/pool/universe/l/linux-aws-hwe/linux-tools-4.15.0-1032-aws_4.15.0-1032.34~16.04.1_arm64.deb": {
3055+ "size": 1826,
3056+ "md5": "04f1e26962e17fee66c744d81f17170d"
3057+ },
3058+ "http://ports.ubuntu.com/pool/universe/l/linux-aws-hwe/linux-aws-hwe-tools-4.15.0-1032_4.15.0-1032.34~16.04.1_arm64.deb": {
3059+ "size": 3386216,
3060+ "md5": "f2faf65a0a95f3f8f17a1de523332645"
3061+ },
3062+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/irda-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_arm64.udeb": {
3063+ "size": 164130,
3064+ "md5": "104779f831fae41b4b562f3500055c37"
3065+ },
3066+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/linux-headers-4.15.0-45-generic_4.15.0-45.48~16.04.1_arm64.deb": {
3067+ "size": 763822,
3068+ "md5": "ca60cc5de8bfab3fa456ee9f4998b03e"
3069+ },
3070+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/message-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_arm64.udeb": {
3071+ "size": 193984,
3072+ "md5": "c13aaf9d200cbc79264b02d4366ced6d"
3073+ },
3074+ "http://ports.ubuntu.com/pool/main/l/linux-hwe/parport-modules-4.15.0-45-generic-di_4.15.0-45.48~16.04.1_arm64.udeb": {
3075+ "size": 17356,
3076+ "md5": "ea70437030f8bfa573df13a4ad45d994"
3077+ },
3078+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-image-extra-virtual-hwe-16.04_4.15.0.45.66_arm64.deb": {
3079+ "size": 1800,
3080+ "md5": "0bb3147ba5ede38c64a9899288e30e4a"
3081+ },
3082+ "http://ports.ubuntu.com/pool/main/l/linux-meta-hwe/linux-tools-virtual-hwe-16.04_4.15.0.45.66_arm64.deb": {
3083+ "size": 2412,
3084+ "md5": "99e068101006b89ec4c0d64fd0406d1c"
3085+ }
3086+ }
3087+ }
3088+ },
3089+ "sources": {
3090+ "linux-aws-hwe": {
3091+ "version": "4.15.0-1032.34~16.04.1",
3092+ "description": "Linux kernel for Amazon Web Services (AWS-HWE) systems"
3093+ },
3094+ "linux-hwe": {
3095+ "version": "4.15.0-45.48~16.04.1",
3096+ "description": "Linux hardware enablement (HWE) kernel"
3097+ },
3098+ "linux-gcp": {
3099+ "version": "4.15.0-1027.28~16.04.1",
3100+ "description": "Linux kernel for Google Cloud Platform (GCP) systems"
3101+ }
3102+ }
3103+ }
3104+ },
3105+ "title": "Linux kernel (HWE) vulnerabilities",
3106+ "timestamp": 1549317277.005356,
3107+ "summary": "linux-hwe, linux-aws-hwe, linux-gcp vulnerabilities",
3108+ "action": "After a standard system update you need to reboot your computer to make\nall the necessary changes.\n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed.\nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well.\n",
3109+ "isummary": "Several security issues were fixed in the Linux kernel.\n",
3110+ "id": "3871-4",
3111+ "cves": [
3112+ "CVE-2018-10876",
3113+ "CVE-2018-10877",
3114+ "CVE-2018-10878",
3115+ "CVE-2018-10879",
3116+ "CVE-2018-10880",
3117+ "CVE-2018-10882",
3118+ "CVE-2018-10883",
3119+ "CVE-2018-14625",
3120+ "CVE-2018-16882",
3121+ "CVE-2018-17972",
3122+ "CVE-2018-18281",
3123+ "CVE-2018-19407",
3124+ "CVE-2018-9516"
3125+ ]
3126+ },
3127+ "3879-1": {
3128+ "description": "Wen Xu discovered that the ext4 file system implementation in the Linux\nkernel could possibly perform an out of bounds write when updating the\njournal for an inline file. An attacker could use this to construct a\nmalicious ext4 image that, when mounted, could cause a denial of service\n(system crash). (CVE-2018-10883)\n\nVasily Averin and Pavel Tikhomirov discovered that the cleancache subsystem\nof the Linux kernel did not properly initialize new files in some\nsituations. A local attacker could use this to expose sensitive\ninformation. (CVE-2018-16862)\n\nWei Wu discovered that the KVM implementation in the Linux kernel did not\nproperly ensure that ioapics were initialized. A local attacker could use\nthis to cause a denial of service (system crash). (CVE-2018-19407)\n\nMathias Payer and Hui Peng discovered a use-after-free vulnerability in the\nAdvanced Linux Sound Architecture (ALSA) subsystem. A physically proximate\nattacker could use this to cause a denial of service (system crash).\n(CVE-2018-19824)\n\nHui Peng and Mathias Payer discovered that the USB subsystem in the Linux\nkernel did not properly handle size checks when handling an extra USB\ndescriptor. A physically proximate attacker could use this to cause a\ndenial of service (system crash). (CVE-2018-20169)\n",
3129+ "releases": {
3130+ "xenial": {
3131+ "allbinaries": {
3132+ "linux-image-generic-lts-wily": {
3133+ "version": "4.4.0.142.148"
3134+ },
3135+ "linux-image-4.4.0-142-powerpc-e500mc": {
3136+ "version": "4.4.0-142.168"
3137+ },
3138+ "linux-image-powerpc64-emb-lts-vivid": {
3139+ "version": "4.4.0.142.148"
3140+ },
3141+ "linux-image-powerpc-e500mc": {
3142+ "version": "4.4.0.142.148"
3143+ },
3144+ "linux-image-generic-lpae-lts-xenial": {
3145+ "version": "4.4.0.142.148"
3146+ },
3147+ "linux-image-powerpc-e500mc-lts-vivid": {
3148+ "version": "4.4.0.142.148"
3149+ },
3150+ "linux-image-4.4.0-1103-raspi2": {
3151+ "version": "4.4.0-1103.111"
3152+ },
3153+ "linux-image-generic-lpae-lts-utopic": {
3154+ "version": "4.4.0.142.148"
3155+ },
3156+ "linux-image-4.4.0-142-generic": {
3157+ "version": "4.4.0-142.168"
3158+ },
3159+ "linux-image-4.4.0-142-powerpc-smp": {
3160+ "version": "4.4.0-142.168"
3161+ },
3162+ "linux-image-powerpc-e500mc-lts-xenial": {
3163+ "version": "4.4.0.142.148"
3164+ },
3165+ "linux-image-powerpc64-smp-lts-utopic": {
3166+ "version": "4.4.0.142.148"
3167+ },
3168+ "linux-image-powerpc-e500mc-lts-wily": {
3169+ "version": "4.4.0.142.148"
3170+ },
3171+ "linux-image-generic-lts-vivid": {
3172+ "version": "4.4.0.142.148"
3173+ },
3174+ "linux-image-4.4.0-142-generic-lpae": {
3175+ "version": "4.4.0-142.168"
3176+ },
3177+ "linux-image-generic-lpae-lts-wily": {
3178+ "version": "4.4.0.142.148"
3179+ },
3180+ "linux-image-4.4.0-1107-snapdragon": {
3181+ "version": "4.4.0-1107.112"
3182+ },
3183+ "linux-image-virtual-lts-vivid": {
3184+ "version": "4.4.0.142.148"
3185+ },
3186+ "linux-image-4.4.0-142-powerpc64-smp": {
3187+ "version": "4.4.0-142.168"
3188+ },
3189+ "linux-image-virtual-lts-utopic": {
3190+ "version": "4.4.0.142.148"
3191+ },
3192+ "linux-image-virtual": {
3193+ "version": "4.4.0.142.148"
3194+ },
3195+ "linux-image-powerpc64-emb-lts-wily": {
3196+ "version": "4.4.0.142.148"
3197+ },
3198+ "linux-image-lowlatency-lts-vivid": {
3199+ "version": "4.4.0.142.148"
3200+ },
3201+ "linux-image-4.4.0-142-powerpc64-emb": {
3202+ "version": "4.4.0-142.168"
3203+ },
3204+ "linux-image-generic-lts-utopic": {
3205+ "version": "4.4.0.142.148"
3206+ },
3207+ "linux-image-powerpc64-emb": {
3208+ "version": "4.4.0.142.148"
3209+ },
3210+ "linux-image-powerpc-smp-lts-xenial": {
3211+ "version": "4.4.0.142.148"
3212+ },
3213+ "linux-image-powerpc64-smp-lts-vivid": {
3214+ "version": "4.4.0.142.148"
3215+ },
3216+ "linux-image-lowlatency-lts-wily": {
3217+ "version": "4.4.0.142.148"
3218+ },
3219+ "linux-image-virtual-lts-wily": {
3220+ "version": "4.4.0.142.148"
3221+ },
3222+ "linux-image-generic": {
3223+ "version": "4.4.0.142.148"
3224+ },
3225+ "linux-image-lowlatency-lts-xenial": {
3226+ "version": "4.4.0.142.148"
3227+ },
3228+ "linux-image-powerpc64-smp-lts-xenial": {
3229+ "version": "4.4.0.142.148"
3230+ },
3231+ "linux-image-4.4.0-1040-kvm": {
3232+ "version": "4.4.0-1040.46"
3233+ },
3234+ "linux-image-powerpc64-emb-lts-utopic": {
3235+ "version": "4.4.0.142.148"
3236+ },
3237+ "linux-image-generic-lts-xenial": {
3238+ "version": "4.4.0.142.148"
3239+ },
3240+ "linux-image-aws": {
3241+ "version": "4.4.0.1075.77"
3242+ },
3243+ "linux-image-kvm": {
3244+ "version": "4.4.0.1040.39"
3245+ },
3246+ "linux-image-raspi2": {
3247+ "version": "4.4.0.1103.103"
3248+ },
3249+ "linux-image-snapdragon": {
3250+ "version": "4.4.0.1107.99"
3251+ },
3252+ "linux-image-powerpc-smp": {
3253+ "version": "4.4.0.142.148"
3254+ },
3255+ "linux-image-generic-lpae-lts-vivid": {
3256+ "version": "4.4.0.142.148"
3257+ },
3258+ "linux-image-generic-lpae": {
3259+ "version": "4.4.0.142.148"
3260+ },
3261+ "linux-image-4.4.0-142-lowlatency": {
3262+ "version": "4.4.0-142.168"
3263+ },
3264+ "linux-image-powerpc-e500mc-lts-utopic": {
3265+ "version": "4.4.0.142.148"
3266+ },
3267+ "linux-image-powerpc64-smp-lts-wily": {
3268+ "version": "4.4.0.142.148"
3269+ },
3270+ "linux-image-powerpc64-emb-lts-xenial": {
3271+ "version": "4.4.0.142.148"
3272+ },
3273+ "linux-image-powerpc-smp-lts-wily": {
3274+ "version": "4.4.0.142.148"
3275+ },
3276+ "linux-image-4.4.0-1075-aws": {
3277+ "version": "4.4.0-1075.85"
3278+ },
3279+ "linux-image-powerpc64-smp": {
3280+ "version": "4.4.0.142.148"
3281+ },
3282+ "linux-image-lowlatency-lts-utopic": {
3283+ "version": "4.4.0.142.148"
3284+ },
3285+ "linux-image-powerpc-smp-lts-vivid": {
3286+ "version": "4.4.0.142.148"
3287+ },
3288+ "linux-image-lowlatency": {
3289+ "version": "4.4.0.142.148"
3290+ },
3291+ "linux-image-virtual-lts-xenial": {
3292+ "version": "4.4.0.142.148"
3293+ },
3294+ "linux-image-powerpc-smp-lts-utopic": {
3295+ "version": "4.4.0.142.148"
3296+ }
3297+ },
3298+ "binaries": {
3299+ "linux-image-powerpc-e500mc": {
3300+ "version": "4.4.0.142.148"
3301+ },
3302+ "linux-image-4.4.0-142-powerpc-e500mc": {
3303+ "version": "4.4.0-142.168"
3304+ },
3305+ "linux-image-4.4.0-142-powerpc64-emb": {
3306+ "version": "4.4.0-142.168"
3307+ },
3308+ "linux-image-4.4.0-142-generic": {
3309+ "version": "4.4.0-142.168"
3310+ },
3311+ "linux-image-4.4.0-142-powerpc-smp": {
3312+ "version": "4.4.0-142.168"
3313+ },
3314+ "linux-image-4.4.0-1107-snapdragon": {
3315+ "version": "4.4.0-1107.112"
3316+ },
3317+ "linux-image-4.4.0-142-powerpc64-smp": {
3318+ "version": "4.4.0-142.168"
3319+ },
3320+ "linux-image-snapdragon": {
3321+ "version": "4.4.0.1107.99"
3322+ },
3323+ "linux-image-powerpc64-emb": {
3324+ "version": "4.4.0.142.148"
3325+ },
3326+ "linux-image-4.4.0-142-generic-lpae": {
3327+ "version": "4.4.0-142.168"
3328+ },
3329+ "linux-image-generic": {
3330+ "version": "4.4.0.142.148"
3331+ },
3332+ "linux-image-4.4.0-1040-kvm": {
3333+ "version": "4.4.0-1040.46"
3334+ },
3335+ "linux-image-aws": {
3336+ "version": "4.4.0.1075.77"
3337+ },
3338+ "linux-image-kvm": {
3339+ "version": "4.4.0.1040.39"
3340+ },
3341+ "linux-image-raspi2": {
3342+ "version": "4.4.0.1103.103"
3343+ },
3344+ "linux-image-powerpc-smp": {
3345+ "version": "4.4.0.142.148"
3346+ },
3347+ "linux-image-generic-lpae": {
3348+ "version": "4.4.0.142.148"
3349+ },
3350+ "linux-image-4.4.0-142-lowlatency": {
3351+ "version": "4.4.0-142.168"
3352+ },
3353+ "linux-image-4.4.0-1103-raspi2": {
3354+ "version": "4.4.0-1103.111"
3355+ },
3356+ "linux-image-4.4.0-1075-aws": {
3357+ "version": "4.4.0-1075.85"
3358+ },
3359+ "linux-image-powerpc64-smp": {
3360+ "version": "4.4.0.142.148"
3361+ },
3362+ "linux-image-lowlatency": {
3363+ "version": "4.4.0.142.148"
3364+ }
3365+ },
3366+ "archs": {
3367+ "all": {
3368+ "urls": {
3369+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-source-4.4.0_4.4.0-142.168_all.deb": {
3370+ "md5": "90c718cd9c86664ba05fe23b7fb7ac58",
3371+ "size": 112816590
3372+ },
3373+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-tools-common_4.4.0-142.168_all.deb": {
3374+ "md5": "2adaca2cad2a637c2299d8da6750ddc3",
3375+ "size": 140316
3376+ },
3377+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-kvm/linux-kvm-headers-4.4.0-1040_4.4.0-1040.46_all.deb": {
3378+ "md5": "a8ab647b8c7fd4ef61456c72fa773503",
3379+ "size": 9979904
3380+ },
3381+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-4.4.0-142_4.4.0-142.168_all.deb": {
3382+ "md5": "e481dc4b2681fab9332e482b0dddf99e",
3383+ "size": 10054152
3384+ },
3385+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-aws/linux-aws-headers-4.4.0-1075_4.4.0-1075.85_all.deb": {
3386+ "md5": "619b85c4294add8e83d4cddae358171e",
3387+ "size": 10052298
3388+ },
3389+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-cloud-tools-common_4.4.0-142.168_all.deb": {
3390+ "md5": "570ac4664be755a7c819f119a9a7f2e3",
3391+ "size": 57340
3392+ },
3393+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-source_4.4.0.142.148_all.deb": {
3394+ "md5": "10caff52c2fa70966555f688842370d5",
3395+ "size": 2278
3396+ },
3397+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-doc_4.4.0-142.168_all.deb": {
3398+ "md5": "fe269d84760ef9731c80de427fec8a93",
3399+ "size": 11300910
3400+ }
3401+ }
3402+ },
3403+ "amd64": {
3404+ "urls": {
3405+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-lowlatency-lts-utopic_4.4.0.142.148_amd64.deb": {
3406+ "md5": "54a56b941c19ea7459693ef6f03009d2",
3407+ "size": 1798
3408+ },
3409+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3410+ "md5": "5cc301bc02963a20860d6d24f27f1364",
3411+ "size": 25828
3412+ },
3413+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-signed/kernel-signed-image-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3414+ "md5": "2a8d0fd659c1e594f16e65882989b463",
3415+ "size": 6913180
3416+ },
3417+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-lowlatency-lts-utopic_4.4.0.142.148_amd64.deb": {
3418+ "md5": "89cd49dfccbe47478ec7a71a11fe56a4",
3419+ "size": 1800
3420+ },
3421+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/speakup-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3422+ "md5": "551bce68d326e14f85d10edd9997eb54",
3423+ "size": 48388
3424+ },
3425+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-virtual_4.4.0.142.148_amd64.deb": {
3426+ "md5": "59194217d0f6981170600735ed43ff05",
3427+ "size": 2292
3428+ },
3429+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-kvm/linux-tools-4.4.0-1040-kvm_4.4.0-1040.46_amd64.deb": {
3430+ "md5": "d2dc99555661f594dbbc4733800dbde8",
3431+ "size": 2596
3432+ },
3433+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-kvm/linux-kvm_4.4.0.1040.39_amd64.deb": {
3434+ "md5": "5c98d09e9aac7d5660778a99bb187c34",
3435+ "size": 1792
3436+ },
3437+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-kvm/linux-image-kvm_4.4.0.1040.39_amd64.deb": {
3438+ "md5": "9c509a5d2ad8a0b0719c8e8c985aa7e7",
3439+ "size": 2290
3440+ },
3441+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-cloud-tools-lowlatency-lts-wily_4.4.0.142.148_amd64.deb": {
3442+ "md5": "aed0d2f284a35fe90527727d88826754",
3443+ "size": 1806
3444+ },
3445+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/multipath-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3446+ "md5": "091e00fcc15fd0584be622dc129248bb",
3447+ "size": 17272
3448+ },
3449+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3450+ "md5": "5d3e2cc863f703a8a38ec534a415a866",
3451+ "size": 146364
3452+ },
3453+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3454+ "md5": "0d829ba888d4385edfe14ce534a8542d",
3455+ "size": 339960
3456+ },
3457+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3458+ "md5": "1bac4e7899527a7e4727719c9f6ef871",
3459+ "size": 229314
3460+ },
3461+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-cloud-tools-virtual-lts-vivid_4.4.0.142.148_amd64.deb": {
3462+ "md5": "9adfd1412304c99f61fa924f291773ce",
3463+ "size": 1834
3464+ },
3465+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-extra-virtual-lts-vivid_4.4.0.142.148_amd64.deb": {
3466+ "md5": "822c9aa40bcc16ebb2a4161073b8188a",
3467+ "size": 1792
3468+ },
3469+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3470+ "md5": "c8dd664902d1f7f21392c09b567e647d",
3471+ "size": 381936
3472+ },
3473+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-lowlatency-lts-wily_4.4.0.142.148_amd64.deb": {
3474+ "md5": "2f5c6a7d4553926cb8a15c1dba8a5b1d",
3475+ "size": 1798
3476+ },
3477+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3478+ "md5": "c4658d02b4d33ca02c5818bc62f4bdbf",
3479+ "size": 89252
3480+ },
3481+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3482+ "md5": "d1b0e31dd24aa897f2c53d5a91a6b661",
3483+ "size": 257800
3484+ },
3485+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-extra-virtual-lts-xenial_4.4.0.142.148_amd64.deb": {
3486+ "md5": "bf520d732d70b6459c9b60cf68ba6de7",
3487+ "size": 1796
3488+ },
3489+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3490+ "md5": "970dea94939c0a89319c96e9faea3511",
3491+ "size": 69558
3492+ },
3493+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-udebs-generic_4.4.0-142.168_amd64.udeb": {
3494+ "md5": "a869ed8370c1d2864be1da14bc3d797c",
3495+ "size": 944
3496+ },
3497+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-generic-lts-utopic_4.4.0.142.148_amd64.deb": {
3498+ "md5": "7ac2cab9662027e402f0b3c1f76e2833",
3499+ "size": 1802
3500+ },
3501+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-virtual-lts-utopic_4.4.0.142.148_amd64.deb": {
3502+ "md5": "014a0fab747fab52e4472ccc1f32dff2",
3503+ "size": 1822
3504+ },
3505+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-cloud-tools-generic-lts-wily_4.4.0.142.148_amd64.deb": {
3506+ "md5": "bcae75b1055ae5bc9af60aad72c39b23",
3507+ "size": 1806
3508+ },
3509+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-cloud-tools-4.4.0-142_4.4.0-142.168_amd64.deb": {
3510+ "md5": "e388de0d1d1dd4660908e69ead6ed559",
3511+ "size": 64406
3512+ },
3513+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3514+ "md5": "ac8e33fe02014e22cab138a428f1463a",
3515+ "size": 47214
3516+ },
3517+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-hwe-virtual-trusty_4.4.0.142.148_amd64.deb": {
3518+ "md5": "41e33ff77fb97438cde7cb7bf3c005b2",
3519+ "size": 1816
3520+ },
3521+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-lowlatency_4.4.0.142.148_amd64.deb": {
3522+ "md5": "7a74fa07a959b7a4484e5a75bb9c7b3c",
3523+ "size": 2284
3524+ },
3525+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-virtual-lts-vivid_4.4.0.142.148_amd64.deb": {
3526+ "md5": "7b8a4c6f19ba558d44b4ed0d63d03c6e",
3527+ "size": 1818
3528+ },
3529+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-generic-lts-wily_4.4.0.142.148_amd64.deb": {
3530+ "md5": "bbd193c85d156008fff4396feb91e282",
3531+ "size": 1794
3532+ },
3533+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3534+ "md5": "37c7ad163d9a75b0f0f097541a0b668d",
3535+ "size": 33560
3536+ },
3537+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3538+ "md5": "cf2c2447d36c4392cd025d1dc9374c6c",
3539+ "size": 4367654
3540+ },
3541+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-4.4.0-142-generic_4.4.0-142.168_amd64.deb": {
3542+ "md5": "7a5b3bfe0da9937744f06edbd889d24a",
3543+ "size": 819098
3544+ },
3545+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3546+ "md5": "534f010ba530449dcdd5f1c2d9e952c9",
3547+ "size": 97452
3548+ },
3549+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-virtual_4.4.0.142.148_amd64.deb": {
3550+ "md5": "ba37c9954a0b04ceb5c9509bfde7b710",
3551+ "size": 1760
3552+ },
3553+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-generic_4.4.0.142.148_amd64.deb": {
3554+ "md5": "151ec074abebbd2795ad24057cbec43c",
3555+ "size": 2280
3556+ },
3557+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-kvm/linux-kvm-cloud-tools-4.4.0-1040_4.4.0-1040.46_amd64.deb": {
3558+ "md5": "d56842ef629a026a6154530034c58b27",
3559+ "size": 64890
3560+ },
3561+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-signed-generic-lts-utopic_4.4.0.142.148_amd64.deb": {
3562+ "md5": "4d93d372f62409dc42c0885b69dd6134",
3563+ "size": 1814
3564+ },
3565+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-lowlatency-lts-vivid_4.4.0.142.148_amd64.deb": {
3566+ "md5": "9def49621e047538b879959ec0fda835",
3567+ "size": 1798
3568+ },
3569+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-aws/linux-aws-tools-4.4.0-1075_4.4.0-1075.85_amd64.deb": {
3570+ "md5": "ab6a3093786f1560ad30251a54cf2376",
3571+ "size": 719656
3572+ },
3573+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-cloud-tools-virtual-lts-xenial_4.4.0.142.148_amd64.deb": {
3574+ "md5": "30de4c197a6eb9c642991f749c673f54",
3575+ "size": 1838
3576+ },
3577+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3578+ "md5": "9c654be40b46c98ac46a2d5bfb9f82c1",
3579+ "size": 137232
3580+ },
3581+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-kvm/linux-kvm-tools-4.4.0-1040_4.4.0-1040.46_amd64.deb": {
3582+ "md5": "0976cf693c06a5ec3d0b41daf4da05ae",
3583+ "size": 721850
3584+ },
3585+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-hwe-virtual-trusty_4.4.0.142.148_amd64.deb": {
3586+ "md5": "ad75510600f34519eb8cbf8770b71c32",
3587+ "size": 1816
3588+ },
3589+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-generic-lts-utopic_4.4.0.142.148_amd64.deb": {
3590+ "md5": "e840f9c0d911c695b27d25e2818998bb",
3591+ "size": 1794
3592+ },
3593+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-kvm/linux-tools-kvm_4.4.0.1040.39_amd64.deb": {
3594+ "md5": "5dc6dfdf013d0239160c287639586201",
3595+ "size": 2296
3596+ },
3597+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-aws/linux-aws_4.4.0.1075.77_amd64.deb": {
3598+ "md5": "00fe618dca86bea1a9e72383d02411ed",
3599+ "size": 1804
3600+ },
3601+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-lowlatency-lts-xenial_4.4.0.142.148_amd64.deb": {
3602+ "md5": "bfde9ed85b89cdfa627edcc9462d913f",
3603+ "size": 1798
3604+ },
3605+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-kvm/linux-headers-4.4.0-1040-kvm_4.4.0-1040.46_amd64.deb": {
3606+ "md5": "1475bc00e5b8309f65d02d92723d83e4",
3607+ "size": 375116
3608+ },
3609+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-lowlatency-lts-wily_4.4.0.142.148_amd64.deb": {
3610+ "md5": "4a49e6ef18d51c35229e4f5b432ff74f",
3611+ "size": 1798
3612+ },
3613+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3614+ "md5": "4f588debbcfde6ffb5a34c2cf3d5aa3b",
3615+ "size": 68388
3616+ },
3617+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-lowlatency-lts-vivid_4.4.0.142.148_amd64.deb": {
3618+ "md5": "f4d5d5651f6201c1d6ba461fe98a2e85",
3619+ "size": 1796
3620+ },
3621+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-signed/linux-signed-image-4.4.0-142-lowlatency_4.4.0-142.168_amd64.deb": {
3622+ "md5": "2a37d82eb2e47d926fc8a28fe4eacb00",
3623+ "size": 4004
3624+ },
3625+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-lowlatency_4.4.0.142.148_amd64.deb": {
3626+ "md5": "3dfed83c6a211966d7fd14f68529105f",
3627+ "size": 2286
3628+ },
3629+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-signed-image-lowlatency_4.4.0.142.148_amd64.deb": {
3630+ "md5": "f4689eeff06014099724fac05fc16f14",
3631+ "size": 2362
3632+ },
3633+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-lowlatency-lts-wily_4.4.0.142.148_amd64.deb": {
3634+ "md5": "33c6249ede6cdb522d3708e770d364f6",
3635+ "size": 1800
3636+ },
3637+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-aws/linux-aws-cloud-tools-4.4.0-1075_4.4.0-1075.85_amd64.deb": {
3638+ "md5": "35d294c55ff5de833c160485e3161bf4",
3639+ "size": 63174
3640+ },
3641+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-virtual-lts-utopic_4.4.0.142.148_amd64.deb": {
3642+ "md5": "2f46a568cba4f352f257a5976451b47f",
3643+ "size": 1802
3644+ },
3645+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-signed-lowlatency_4.4.0.142.148_amd64.deb": {
3646+ "md5": "31e77042aeb0aa7d40b414a9574a6aef",
3647+ "size": 1822
3648+ },
3649+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-cloud-tools-generic-lts-utopic_4.4.0.142.148_amd64.deb": {
3650+ "md5": "8aa654d928e379c0a64ee2592c564d83",
3651+ "size": 1804
3652+ },
3653+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-aws/linux-tools-aws_4.4.0.1075.77_amd64.deb": {
3654+ "md5": "01cd235c135704d27118f926c1793e0e",
3655+ "size": 2312
3656+ },
3657+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-lowlatency-lts-utopic_4.4.0.142.148_amd64.deb": {
3658+ "md5": "8761bb3fe5eef448fc98780159f982c2",
3659+ "size": 1798
3660+ },
3661+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-virtual-lts-xenial_4.4.0.142.148_amd64.deb": {
3662+ "md5": "2edf8228ae4cc04bf13373bbcdb60ddd",
3663+ "size": 1788
3664+ },
3665+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-aws/linux-tools-4.4.0-1075-aws_4.4.0-1075.85_amd64.deb": {
3666+ "md5": "56c45086c3206effaa7e8ccfd3f07739",
3667+ "size": 2598
3668+ },
3669+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-aws/linux-image-aws_4.4.0.1075.77_amd64.deb": {
3670+ "md5": "0ec0c87964c54a626755a296b0783c5a",
3671+ "size": 2306
3672+ },
3673+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-hwe-generic-trusty_4.4.0.142.148_amd64.deb": {
3674+ "md5": "8989a82183666d0963b3ac138e8150dc",
3675+ "size": 1814
3676+ },
3677+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-cloud-tools-4.4.0-142-generic_4.4.0-142.168_amd64.deb": {
3678+ "md5": "cb5b8520e19c7f2950e0ce209493c8f6",
3679+ "size": 2546
3680+ },
3681+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-cloud-tools-lowlatency-lts-xenial_4.4.0.142.148_amd64.deb": {
3682+ "md5": "a56d2057fc42fb84b238e43ecfaa8fc5",
3683+ "size": 1808
3684+ },
3685+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipmi-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3686+ "md5": "affc7ca7580d885c3ec5e937ed42571f",
3687+ "size": 59686
3688+ },
3689+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-lowlatency-lts-vivid_4.4.0.142.148_amd64.deb": {
3690+ "md5": "2cec27602c6d3ef2f91a5ac1f3808f04",
3691+ "size": 1798
3692+ },
3693+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-lowlatency_4.4.0.142.148_amd64.deb": {
3694+ "md5": "a52d4ac2a0fcd15a02f5ecb0fdd09dde",
3695+ "size": 2324
3696+ },
3697+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-generic-lts-xenial_4.4.0.142.148_amd64.deb": {
3698+ "md5": "e32662428f6b9a65d1f6e027419673c4",
3699+ "size": 1798
3700+ },
3701+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-lowlatency-lts-xenial_4.4.0.142.148_amd64.deb": {
3702+ "md5": "e9f49827fded9b3efad9629d3baa0693",
3703+ "size": 1800
3704+ },
3705+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-generic_4.4.0.142.148_amd64.deb": {
3706+ "md5": "ae41c12141ce073a1b611eeb86891f0b",
3707+ "size": 1784
3708+ },
3709+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-virtual-lts-wily_4.4.0.142.148_amd64.deb": {
3710+ "md5": "35a71becb588cb8d51086f31de172e00",
3711+ "size": 1822
3712+ },
3713+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-lowlatency-lts-vivid_4.4.0.142.148_amd64.deb": {
3714+ "md5": "0bbc888da2df69590e2e55b0fac8f87f",
3715+ "size": 1800
3716+ },
3717+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3718+ "md5": "e7726505de2a34de2958da883fe5136e",
3719+ "size": 7785078
3720+ },
3721+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3722+ "md5": "fc31a60c5b7f38f91e2c371193961eb7",
3723+ "size": 296602
3724+ },
3725+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3726+ "md5": "3d432d2307150b1a2751df13ac54d1e8",
3727+ "size": 2710
3728+ },
3729+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-generic-lts-vivid_4.4.0.142.148_amd64.deb": {
3730+ "md5": "7a529435c0159888f1e57844d9143c71",
3731+ "size": 1794
3732+ },
3733+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-signed-lowlatency-lts-wily_4.4.0.142.148_amd64.deb": {
3734+ "md5": "20de732ecca6ae6973d14baa274afe92",
3735+ "size": 1818
3736+ },
3737+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-cloud-tools-4.4.0-142-lowlatency_4.4.0-142.168_amd64.deb": {
3738+ "md5": "5ddf4d4d4ad6687e67506c015d314701",
3739+ "size": 2552
3740+ },
3741+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-extra-virtual_4.4.0.142.148_amd64.deb": {
3742+ "md5": "7e5bdadaa258cbe881de542c044985ea",
3743+ "size": 1766
3744+ },
3745+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-aws/linux-headers-4.4.0-1075-aws_4.4.0-1075.85_amd64.deb": {
3746+ "md5": "6681a20d3112b207fda4792b6b788597",
3747+ "size": 703622
3748+ },
3749+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-signed-image-generic-lts-wily_4.4.0.142.148_amd64.deb": {
3750+ "md5": "98ad729d62c57b460daa187ece87019a",
3751+ "size": 1804
3752+ },
3753+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-extra-virtual-lts-utopic_4.4.0.142.148_amd64.deb": {
3754+ "md5": "a1db6bd11e75ecd2fc00b17661928627",
3755+ "size": 1792
3756+ },
3757+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-generic-lts-xenial_4.4.0.142.148_amd64.deb": {
3758+ "md5": "f2223fe338ff9fa9da022e5c73a52adc",
3759+ "size": 1800
3760+ },
3761+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-signed-generic_4.4.0.142.148_amd64.deb": {
3762+ "md5": "5b4c33d463c9150ed140b33cbadf04c6",
3763+ "size": 1816
3764+ },
3765+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-signed-lowlatency-lts-xenial_4.4.0.142.148_amd64.deb": {
3766+ "md5": "015566d09a611f369350a3e788bd2487",
3767+ "size": 1820
3768+ },
3769+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-cloud-tools-virtual_4.4.0.142.148_amd64.deb": {
3770+ "md5": "27ff13be41e6f4dae2c582de27deccb4",
3771+ "size": 2310
3772+ },
3773+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-virtual-lts-wily_4.4.0.142.148_amd64.deb": {
3774+ "md5": "32de09f8cefcf0241b69f48f94ae2d6a",
3775+ "size": 1798
3776+ },
3777+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3778+ "md5": "20370020f34219acb9d5f6c4d03ea12f",
3779+ "size": 33632
3780+ },
3781+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-lowlatency-lts-utopic_4.4.0.142.148_amd64.deb": {
3782+ "md5": "bab95a50df88d7abdfee54f25e17bd09",
3783+ "size": 1800
3784+ },
3785+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-tools-4.4.0-142_4.4.0-142.168_amd64.deb": {
3786+ "md5": "ef44832dddcb74f4983681a3925c119e",
3787+ "size": 720652
3788+ },
3789+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-virtual-lts-xenial_4.4.0.142.148_amd64.deb": {
3790+ "md5": "89bf198bd43a8278ad39ad535dd31145",
3791+ "size": 1802
3792+ },
3793+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-generic-lts-utopic_4.4.0.142.148_amd64.deb": {
3794+ "md5": "62b0be62bda61c886a39f430266fe042",
3795+ "size": 1794
3796+ },
3797+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-cloud-tools-virtual-lts-wily_4.4.0.142.148_amd64.deb": {
3798+ "md5": "d66d40949c582e4f784fab0c47dd999f",
3799+ "size": 1832
3800+ },
3801+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-generic-lts-wily_4.4.0.142.148_amd64.deb": {
3802+ "md5": "071f772644922fc58c0cf15d334e87fe",
3803+ "size": 1798
3804+ },
3805+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-lowlatency-lts-xenial_4.4.0.142.148_amd64.deb": {
3806+ "md5": "5af64c7877f2febd3795b688d50da371",
3807+ "size": 1802
3808+ },
3809+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-generic-lts-xenial_4.4.0.142.148_amd64.deb": {
3810+ "md5": "40225206ff3b9cdf1a68c65efee03d63",
3811+ "size": 1804
3812+ },
3813+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-signed/linux-signed-image-4.4.0-142-generic_4.4.0-142.168_amd64.deb": {
3814+ "md5": "adda866025df8e756b6f53ece7a075ba",
3815+ "size": 4010
3816+ },
3817+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-aws/linux-headers-aws_4.4.0.1075.77_amd64.deb": {
3818+ "md5": "59ab949d64b9e36a1448bed042674703",
3819+ "size": 2314
3820+ },
3821+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-cloud-tools-generic-lts-xenial_4.4.0.142.148_amd64.deb": {
3822+ "md5": "375025deb48681bc78689e8a57d346b0",
3823+ "size": 1804
3824+ },
3825+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-signed-image-generic-lts-xenial_4.4.0.142.148_amd64.deb": {
3826+ "md5": "e4bdc0d77e81011dc2ce651717f1515b",
3827+ "size": 1810
3828+ },
3829+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-virtual-lts-utopic_4.4.0.142.148_amd64.deb": {
3830+ "md5": "c7f6aacbf0689190f5c5b91cfb592d70",
3831+ "size": 1788
3832+ },
3833+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-generic-lts-vivid_4.4.0.142.148_amd64.deb": {
3834+ "md5": "02d922d3c0c95b98d8e9112d7441f221",
3835+ "size": 1798
3836+ },
3837+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3838+ "md5": "90a1acf1b9b02f13201ba729d227c854",
3839+ "size": 55058
3840+ },
3841+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-signed-generic-lts-vivid_4.4.0.142.148_amd64.deb": {
3842+ "md5": "bc941b67fda5343d344af15cfe92cd6e",
3843+ "size": 1818
3844+ },
3845+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-virtual-lts-vivid_4.4.0.142.148_amd64.deb": {
3846+ "md5": "357dc4a81f7757a4fc3eed9db38289d7",
3847+ "size": 1788
3848+ },
3849+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-virtual_4.4.0.142.148_amd64.deb": {
3850+ "md5": "4bf810c4a35322915016cefc6d2f3644",
3851+ "size": 1778
3852+ },
3853+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-tools-4.4.0-142-generic_4.4.0-142.168_amd64.deb": {
3854+ "md5": "9ff38822d670c4e33fc05f8f6f6e4b8a",
3855+ "size": 2598
3856+ },
3857+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-virtual-lts-wily_4.4.0.142.148_amd64.deb": {
3858+ "md5": "4a3eef28a4b60acb50d157796827a24e",
3859+ "size": 1788
3860+ },
3861+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-virtual-lts-utopic_4.4.0.142.148_amd64.deb": {
3862+ "md5": "3527dff6cac88f4a14f97a9848349653",
3863+ "size": 1822
3864+ },
3865+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-cloud-tools-lowlatency-lts-utopic_4.4.0.142.148_amd64.deb": {
3866+ "md5": "594bc2b0a5a15d1e4e8fb54681bfca64",
3867+ "size": 1804
3868+ },
3869+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-signed-generic-lts-wily_4.4.0.142.148_amd64.deb": {
3870+ "md5": "a2688aa1a9afbaed29712cd9d28e8bf1",
3871+ "size": 1812
3872+ },
3873+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-cloud-tools-generic_4.4.0.142.148_amd64.deb": {
3874+ "md5": "8b65d596a79c627eae93fc922dceeed7",
3875+ "size": 2296
3876+ },
3877+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-extra-virtual-lts-wily_4.4.0.142.148_amd64.deb": {
3878+ "md5": "abca15355b6284f83871d83a3f5303c2",
3879+ "size": 1790
3880+ },
3881+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3882+ "md5": "4b0d83405808963aaa390da4f6755b92",
3883+ "size": 505084
3884+ },
3885+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-signed-image-generic_4.4.0.142.148_amd64.deb": {
3886+ "md5": "f82a1755a2a8f5ddf7dab9ef59a9b863",
3887+ "size": 2368
3888+ },
3889+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-cloud-tools-lowlatency_4.4.0.142.148_amd64.deb": {
3890+ "md5": "e4d4a58ff5465a085da3b320093d2611",
3891+ "size": 2306
3892+ },
3893+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3894+ "md5": "27d6fb2ac47a4dfc990c64ee252987df",
3895+ "size": 294956
3896+ },
3897+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3898+ "md5": "5f9942e2ce39f0065d1cd883d9ef2ab2",
3899+ "size": 204326
3900+ },
3901+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-signed-image-generic-lts-utopic_4.4.0.142.148_amd64.deb": {
3902+ "md5": "d534864973d7d54b24bd4f82fd498337",
3903+ "size": 1804
3904+ },
3905+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-kvm/linux-cloud-tools-4.4.0-1040-kvm_4.4.0-1040.46_amd64.deb": {
3906+ "md5": "1b7b71661fca64cf0311313a57e50629",
3907+ "size": 2556
3908+ },
3909+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-lowlatency-lts-wily_4.4.0.142.148_amd64.deb": {
3910+ "md5": "091749120625ff0a7fee0373a63f9ebc",
3911+ "size": 1796
3912+ },
3913+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3914+ "md5": "1cda32284522e41d97c54b7027a499bf",
3915+ "size": 106346
3916+ },
3917+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-virtual-lts-xenial_4.4.0.142.148_amd64.deb": {
3918+ "md5": "e4c91a7d8b69e3a6ebe29a4cf4115d59",
3919+ "size": 1826
3920+ },
3921+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3922+ "md5": "f28106c562d7252bc43c2db46a00dc93",
3923+ "size": 13924
3924+ },
3925+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/vlan-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3926+ "md5": "3e514908c0389edaaa01b2d2362ce9b7",
3927+ "size": 27830
3928+ },
3929+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-virtual_4.4.0.142.148_amd64.deb": {
3930+ "md5": "18855038f2e6fbb6996d366661ce7f40",
3931+ "size": 2296
3932+ },
3933+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-virtual-lts-vivid_4.4.0.142.148_amd64.deb": {
3934+ "md5": "71d990cfdebf9b41fcadcc343fcf76bc",
3935+ "size": 1820
3936+ },
3937+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-generic_4.4.0.142.148_amd64.deb": {
3938+ "md5": "deaf948ec3dac0bcd1548c180091bd3a",
3939+ "size": 2286
3940+ },
3941+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-signed-generic-lts-xenial_4.4.0.142.148_amd64.deb": {
3942+ "md5": "558b1376be8de978bd3123007010eafc",
3943+ "size": 1816
3944+ },
3945+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3946+ "md5": "6abb9f24303452682e29ac4286538396",
3947+ "size": 1121310
3948+ },
3949+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-signed-image-lowlatency-lts-xenial_4.4.0.142.148_amd64.deb": {
3950+ "md5": "ba6a4cda76155248de0d3fca008f7fca",
3951+ "size": 1814
3952+ },
3953+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-aws/linux-image-4.4.0-1075-aws_4.4.0-1075.85_amd64.deb": {
3954+ "md5": "69e0c2ea07f14cda166324c5c67012dc",
3955+ "size": 19069600
3956+ },
3957+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-kvm/linux-image-4.4.0-1040-kvm_4.4.0-1040.46_amd64.deb": {
3958+ "md5": "9c150e226d7d784f71e51df4a74cac90",
3959+ "size": 9925734
3960+ },
3961+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-lts-utopic_4.4.0.142.148_amd64.deb": {
3962+ "md5": "0e12fd09d27844b13683a0fc43002c12",
3963+ "size": 1794
3964+ },
3965+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-crashdump_4.4.0.142.148_amd64.deb": {
3966+ "md5": "e3262209ce3b7ed39fe389c123538a3f",
3967+ "size": 2530
3968+ },
3969+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-signed-image-generic-lts-vivid_4.4.0.142.148_amd64.deb": {
3970+ "md5": "540b4deae31a8883f937e0bee1e3202d",
3971+ "size": 1806
3972+ },
3973+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3974+ "md5": "1b10e627b4db825b538ce70555d0a1dd",
3975+ "size": 9276
3976+ },
3977+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-cloud-tools-virtual-lts-utopic_4.4.0.142.148_amd64.deb": {
3978+ "md5": "b7819e1be27f2bf90fb960313e8348d8",
3979+ "size": 1836
3980+ },
3981+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-4.4.0-142-generic_4.4.0-142.168_amd64.deb": {
3982+ "md5": "1017924e6200c1522f6bbbcaabcb8a66",
3983+ "size": 22114984
3984+ },
3985+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-generic-lts-xenial_4.4.0.142.148_amd64.deb": {
3986+ "md5": "c2904513d674735dd5c79c7a78d4bcec",
3987+ "size": 1798
3988+ },
3989+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-virtual-lts-vivid_4.4.0.142.148_amd64.deb": {
3990+ "md5": "3d7c4be1f599952739f4ef6a96c232ad",
3991+ "size": 1800
3992+ },
3993+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
3994+ "md5": "ee22834e7c77967b169318ae0b0aa610",
3995+ "size": 593994
3996+ },
3997+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-generic-lts-wily_4.4.0.142.148_amd64.deb": {
3998+ "md5": "c8b67d16d30215036aa8fdbc2b8971c8",
3999+ "size": 1802
4000+ },
4001+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
4002+ "md5": "8fd205d942d2a4f2cd13fb9df6acfbbe",
4003+ "size": 65350
4004+ },
4005+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-cloud-tools-generic-lts-vivid_4.4.0.142.148_amd64.deb": {
4006+ "md5": "178bb5b4723dce5cf702770711376ef9",
4007+ "size": 1804
4008+ },
4009+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta-kvm/linux-headers-kvm_4.4.0.1040.39_amd64.deb": {
4010+ "md5": "69718d2c286f338bdebd3d3980e5289d",
4011+ "size": 2296
4012+ },
4013+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-tools-4.4.0-142-lowlatency_4.4.0-142.168_amd64.deb": {
4014+ "md5": "ca107700f9bc3c02cb9c6ff504964597",
4015+ "size": 2604
4016+ },
4017+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_4.4.0-142.168_amd64.deb": {
4018+ "md5": "7c0e9d3a58538d3463e43db03419f57d",
4019+ "size": 866916
4020+ },
4021+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-cloud-tools-lowlatency-lts-vivid_4.4.0.142.148_amd64.deb": {
4022+ "md5": "8e86a602b8dae7681fea7e364e29f21c",
4023+ "size": 1808
4024+ },
4025+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-extra-4.4.0-142-generic_4.4.0-142.168_amd64.deb": {
4026+ "md5": "125a4f71094aa591b79da881dc1beb1d",
4027+ "size": 36521414
4028+ },
4029+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
4030+ "md5": "cef0d6e782bc80679cb9b5385778cd18",
4031+ "size": 126374
4032+ },
4033+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-aws/linux-cloud-tools-4.4.0-1075-aws_4.4.0-1075.85_amd64.deb": {
4034+ "md5": "5892beaf1f48140b8869e9dcb670e080",
4035+ "size": 2552
4036+ },
4037+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-4.4.0-142-lowlatency_4.4.0-142.168_amd64.deb": {
4038+ "md5": "2f3f677cf9c0f05de1d9e31aba02568e",
4039+ "size": 58764984
4040+ },
4041+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-generic-lts-utopic_4.4.0.142.148_amd64.deb": {
4042+ "md5": "6c02c48bd42474eafbffa21e83b7b10f",
4043+ "size": 1798
4044+ },
4045+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-virtual-lts-xenial_4.4.0.142.148_amd64.deb": {
4046+ "md5": "f49499d096a7caa60e926d7fbb0cc94c",
4047+ "size": 1822
4048+ },
4049+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-generic-lts-wily_4.4.0.142.148_amd64.deb": {
4050+ "md5": "811c38acf654a37303bc820a77a64ac4",
4051+ "size": 1796
4052+ },
4053+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-lowlatency-lts-xenial_4.4.0.142.148_amd64.deb": {
4054+ "md5": "e344112c514765397fee62e45f201577",
4055+ "size": 1798
4056+ },
4057+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-hwe-generic-trusty_4.4.0.142.148_amd64.deb": {
4058+ "md5": "949447c107c1cff29e94bf49be823f76",
4059+ "size": 1820
4060+ },
4061+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-generic-lts-vivid_4.4.0.142.148_amd64.deb": {
4062+ "md5": "8ae60aa5cd3910ce91594af8bb80f29e",
4063+ "size": 1804
4064+ },
4065+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-generic-lts-vivid_4.4.0.142.148_amd64.deb": {
4066+ "md5": "22b595459118c8a23950065eb5147f87",
4067+ "size": 1796
4068+ },
4069+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
4070+ "md5": "f1c5849710834987353ecbcc029c5c74",
4071+ "size": 2204844
4072+ },
4073+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-signed-image-lowlatency-lts-wily_4.4.0.142.148_amd64.deb": {
4074+ "md5": "6af91c44e523b6c8b18ccf014b20978e",
4075+ "size": 1814
4076+ },
4077+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-virtual-lts-wily_4.4.0.142.148_amd64.deb": {
4078+ "md5": "dc5367f381d74d70b6f51e6683eecf86",
4079+ "size": 1822
4080+ },
4081+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-lowlatency_4.4.0.142.148_amd64.deb": {
4082+ "md5": "1be603b2421eb932a20739c45cdcd101",
4083+ "size": 1786
4084+ },
4085+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-4.4.0-142-lowlatency_4.4.0-142.168_amd64.deb": {
4086+ "md5": "a6ebdf0473eda5513dd28e508bd4955a",
4087+ "size": 819290
4088+ },
4089+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-generic_4.4.0.142.148_amd64.deb": {
4090+ "md5": "f95817f64707b68127dd186819c7944b",
4091+ "size": 2328
4092+ },
4093+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-4.4.0-142-generic-di_4.4.0-142.168_amd64.udeb": {
4094+ "md5": "a315dcb2580bab4c75efe60cc07f9c39",
4095+ "size": 517694
4096+ }
4097+ }
4098+ },
4099+ "ppc64el": {
4100+ "urls": {
4101+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-generic-lts-wily_4.4.0.142.148_ppc64el.deb": {
4102+ "md5": "178b3d8ca59a65c99bd0b947597ac5ed",
4103+ "size": 1808
4104+ },
4105+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-hwe-generic-trusty_4.4.0.142.148_ppc64el.deb": {
4106+ "md5": "79b88497f7b0ecfab59ee77e2a5e7baf",
4107+ "size": 1822
4108+ },
4109+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-image-extra-virtual_4.4.0.142.148_ppc64el.deb": {
4110+ "md5": "0efc038af96a73e2907690744f7a5dab",
4111+ "size": 1770
4112+ },
4113+ "http://ports.ubuntu.com/pool/main/l/linux/fb-modules-4.4.0-142-generic-di_4.4.0-142.168_ppc64el.udeb": {
4114+ "md5": "df55588079b87f0c8137a02256c621d4",
4115+ "size": 22196
4116+ },
4117+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-image-generic-lts-wily_4.4.0.142.148_ppc64el.deb": {
4118+ "md5": "3e62433774e87f5bbd10bf5e8c840d73",
4119+ "size": 1794
4120+ },
4121+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-tools-generic-lts-utopic_4.4.0.142.148_ppc64el.deb": {
4122+ "md5": "efbd67baca748eb0a1ba1001bfb52d72",
4123+ "size": 1796
4124+ },
4125+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-virtual_4.4.0.142.148_ppc64el.deb": {
4126+ "md5": "f1acc796097a5d083c990393b3926805",
4127+ "size": 1784
4128+ },
4129+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-image-extra-virtual-lts-utopic_4.4.0.142.148_ppc64el.deb": {
4130+ "md5": "a56e4708d281d8df6dac38877e2c5990",
4131+ "size": 1798
4132+ },
4133+ "http://ports.ubuntu.com/pool/main/l/linux/linux-headers-4.4.0-142-generic_4.4.0-142.168_ppc64el.deb": {
4134+ "md5": "3d19111abca21f146590bcf832ed5916",
4135+ "size": 1008146
4136+ },
4137+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-image-virtual-lts-utopic_4.4.0.142.148_ppc64el.deb": {
4138+ "md5": "c139f24170a0ffbbb0b5148ddd770e95",
4139+ "size": 1830
4140+ },
4141+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-headers-generic_4.4.0.142.148_ppc64el.deb": {
4142+ "md5": "dd867064191afb38fa38473a37c73b60",
4143+ "size": 2278
4144+ },
4145+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-headers-generic-lts-xenial_4.4.0.142.148_ppc64el.deb": {
4146+ "md5": "97d5010740d4174e4fa8f44551cadca2",
4147+ "size": 1802
4148+ },
4149+ "http://ports.ubuntu.com/pool/main/l/linux/nfs-modules-4.4.0-142-generic-di_4.4.0-142.168_ppc64el.udeb": {
4150+ "md5": "72526a7f65c8ba856fd945cc135c6e9a",
4151+ "size": 515350
4152+ },
4153+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-virtual-lts-utopic_4.4.0.142.148_ppc64el.deb": {
4154+ "md5": "0ae7a84cc49b61f208a382daa56bde81",
4155+ "size": 1800
4156+ },
4157+ "http://ports.ubuntu.com/pool/main/l/linux/nic-shared-modules-4.4.0-142-generic-di_4.4.0-142.168_ppc64el.udeb": {
4158+ "md5": "963b709bd0284aa85786b89d94d6c2af",
4159+ "size": 509150
4160+ },
4161+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-generic_4.4.0.142.148_ppc64el.deb": {
4162+ "md5": "8c72322ef590210312964c13b8a5fd83",
4163+ "size": 1784
4164+ },
4165+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-image-hwe-generic-trusty_4.4.0.142.148_ppc64el.deb": {
4166+ "md5": "d6abff0e2abdbcc17baa0466a3973554",
4167+ "size": 1816
4168+ },
4169+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-tools-generic-lts-wily_4.4.0.142.148_ppc64el.deb": {
4170+ "md5": "862caa7e728ad352ce063ac9fe971bba",
4171+ "size": 1794
4172+ },
4173+ "http://ports.ubuntu.com/pool/main/l/linux/message-modules-4.4.0-142-generic-di_4.4.0-142.168_ppc64el.udeb": {
4174+ "md5": "18d4bae40ce0afef8364aa72f80e401e",
4175+ "size": 201658
4176+ },
4177+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-tools-generic-lts-xenial_4.4.0.142.148_ppc64el.deb": {
4178+ "md5": "f5ff8ffa38ce2b589302e1266d94e9ac",
4179+ "size": 1798
4180+ },
4181+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-crashdump_4.4.0.142.148_ppc64el.deb": {
4182+ "md5": "90c97004da4309a84ec3c61d8cba18a3",
4183+ "size": 2474
4184+ },
4185+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-image-hwe-virtual-trusty_4.4.0.142.148_ppc64el.deb": {
4186+ "md5": "e829513641c70c6e0c6a564dde3d3e01",
4187+ "size": 1816
4188+ },
4189+ "http://ports.ubuntu.com/pool/main/l/linux/input-modules-4.4.0-142-generic-di_4.4.0-142.168_ppc64el.udeb": {
4190+ "md5": "3326d1b7172a948d40227a85cef4e95b",
4191+ "size": 274044
4192+ },
4193+ "http://ports.ubuntu.com/pool/main/l/linux/linux-tools-4.4.0-142-generic_4.4.0-142.168_ppc64el.deb": {
4194+ "md5": "535fd207d9aec1f01cd741ee30eebf5c",
4195+ "size": 2560
4196+ },
4197+ "http://ports.ubuntu.com/pool/main/l/linux/multipath-modules-4.4.0-142-generic-di_4.4.0-142.168_ppc64el.udeb": {
4198+ "md5": "a00b2e95ee9ad99d70568ef56714b222",
4199+ "size": 18302
4200+ },
4201+ "http://ports.ubuntu.com/pool/main/l/linux/block-modules-4.4.0-142-generic-di_4.4.0-142.168_ppc64el.udeb": {
4202+ "md5": "b28b6c477dec8c48fec928a221cea412",
4203+ "size": 382862
4204+ },
4205+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-tools-virtual-lts-utopic_4.4.0.142.148_ppc64el.deb": {
4206+ "md5": "257c11572cc07fccb06a1be12e3246ff",
4207+ "size": 1830
4208+ },
4209+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-tools-generic_4.4.0.142.148_ppc64el.deb": {
4210+ "md5": "a6a41db39b126133383be6de7b4f5828",
4211+ "size": 2284
4212+ },
4213+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-virtual-lts-vivid_4.4.0.142.148_ppc64el.deb": {
4214+ "md5": "91f2050375532c181ac33be8977b07ab",
4215+ "size": 1800
4216+ },
4217+ "http://ports.ubuntu.com/pool/main/l/linux/nic-modules-4.4.0-142-generic-di_4.4.0-142.168_ppc64el.udeb": {
4218+ "md5": "52ac2bcf2aa3e6fe711f2133a61d4de3",
4219+ "size": 4375268
4220+ },
4221+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-virtual-lts-xenial_4.4.0.142.148_ppc64el.deb": {
4222+ "md5": "dcb5c45337d417b0263a1ed230eab843",
4223+ "size": 1804
4224+ },
4225+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-headers-virtual-lts-utopic_4.4.0.142.148_ppc64el.deb": {
4226+ "md5": "7c66ac1c6d84f666e9b1f23929fd4c64",
4227+ "size": 1786
4228+ },
4229+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-image-virtual-lts-xenial_4.4.0.142.148_ppc64el.deb": {
4230+ "md5": "316a32d92bfd8f2fb874bd9aa2a0f930",
4231+ "size": 1830
4232+ },
4233+ "http://ports.ubuntu.com/pool/main/l/linux/md-modules-4.4.0-142-generic-di_4.4.0-142.168_ppc64el.udeb": {
4234+ "md5": "c90136147de75dc691a631a5617ac9e4",
4235+ "size": 253420
4236+ },
4237+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-tools-lts-utopic_4.4.0.142.148_ppc64el.deb": {
4238+ "md5": "c11e93dd75fbf31a19ecfbf89f01dbd6",
4239+ "size": 1798
4240+ },
4241+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-image-generic-lts-utopic_4.4.0.142.148_ppc64el.deb": {
4242+ "md5": "812afabe32a4217c2121c261d452eae5",
4243+ "size": 1800
4244+ },
4245+ "http://ports.ubuntu.com/pool/main/l/linux/scsi-modules-4.4.0-142-generic-di_4.4.0-142.168_ppc64el.udeb": {
4246+ "md5": "93a50f4838052a8da8e9db7b64e40af6",
4247+ "size": 2072762
4248+ },
4249+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-headers-virtual_4.4.0.142.148_ppc64el.deb": {
4250+ "md5": "5ae085f15826b3910c96dc97a5e6de71",
4251+ "size": 1758
4252+ },
4253+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-image-virtual_4.4.0.142.148_ppc64el.deb": {
4254+ "md5": "8cbbbf58d197840be575bfb1fd993168",
4255+ "size": 2294
4256+ },
4257+ "http://ports.ubuntu.com/pool/main/l/linux/vlan-modules-4.4.0-142-generic-di_4.4.0-142.168_ppc64el.udeb": {
4258+ "md5": "46dc98f1073f371048b34545b5e92bdc",
4259+ "size": 28894
4260+ },
4261+ "http://ports.ubuntu.com/pool/main/l/linux/storage-core-modules-4.4.0-142-generic-di_4.4.0-142.168_ppc64el.udeb": {
4262+ "md5": "ba62cab1f6f98a1dad606310ec01455c",
4263+ "size": 47914
4264+ },
4265+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-headers-generic-lts-vivid_4.4.0.142.148_ppc64el.deb": {
4266+ "md5": "9dafb212b15318119cd3445358723dae",
4267+ "size": 1802
4268+ },
4269+ "http://ports.ubuntu.com/pool/main/l/linux/fs-secondary-modules-4.4.0-142-generic-di_4.4.0-142.168_ppc64el.udeb": {
4270+ "md5": "7324b29ac67540d4f5c5da24fc4c1aa3",
4271+ "size": 577010
4272+ },
4273+ "http://ports.ubuntu.com/pool/main/l/linux/linux-udebs-generic_4.4.0-142.168_ppc64el.udeb": {
4274+ "md5": "fd2599b6cfb5b533a591657e265b5acd",
4275+ "size": 890
4276+ },
4277+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-image-generic-lts-vivid_4.4.0.142.148_ppc64el.deb": {
4278+ "md5": "39e554df35614c77d4b7fefc4db63dcc",
4279+ "size": 1798
4280+ },
4281+ "http://ports.ubuntu.com/pool/main/l/linux/plip-modules-4.4.0-142-generic-di_4.4.0-142.168_ppc64el.udeb": {
4282+ "md5": "a691617eddbfa5de48c1d2a967cf6fea",
4283+ "size": 9228
4284+ },
4285+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-tools-virtual_4.4.0.142.148_ppc64el.deb": {
4286+ "md5": "5acc25c1376124a2b2b741c6bfc2f6e0",
4287+ "size": 2298
4288+ },
4289+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-tools-generic-lts-vivid_4.4.0.142.148_ppc64el.deb": {
4290+ "md5": "59eb3b805bdbb7662c4e599936baf93c",
4291+ "size": 1794
4292+ },
4293+ "http://ports.ubuntu.com/pool/main/l/linux/fs-core-modules-4.4.0-142-generic-di_4.4.0-142.168_ppc64el.udeb": {
4294+ "md5": "d8c46bb1972e813b6dd6b63ef6f371bf",
4295+ "size": 1114054
4296+ },
4297+ "http://ports.ubuntu.com/pool/main/l/linux/linux-image-4.4.0-142-generic_4.4.0-142.168_ppc64el.deb": {
4298+ "md5": "786dc896f51fc41eb6c4b787ac15f9f5",
4299+ "size": 22232042
4300+ },
4301+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-image-virtual-lts-wily_4.4.0.142.148_ppc64el.deb": {
4302+ "md5": "2b991707f6a7111abf8a311bd366e8e4",
4303+ "size": 1824
4304+ },
4305+ "http://ports.ubuntu.com/pool/main/l/linux/parport-modules-4.4.0-142-generic-di_4.4.0-142.168_ppc64el.udeb": {
4306+ "md5": "0a06f75ed00925fe49992fc392dd7a5b",
4307+ "size": 38874
4308+ },
4309+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-headers-generic-lts-wily_4.4.0.142.148_ppc64el.deb": {
4310+ "md5": "46782c6ff0a7aed07077aa68f19e4a89",
4311+ "size": 1802
4312+ },
4313+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-virtual-lts-wily_4.4.0.142.148_ppc64el.deb": {
4314+ "md5": "43dc23318775a8d0f6df8094cf08455c",
4315+ "size": 1800
4316+ },
4317+ "http://ports.ubuntu.com/pool/main/l/linux/linux-image-extra-4.4.0-142-generic_4.4.0-142.168_ppc64el.deb": {
4318+ "md5": "0b760479fc545b1ae22a65e07d7e4175",
4319+ "size": 35474830
4320+ },
4321+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-image-generic-lts-xenial_4.4.0.142.148_ppc64el.deb": {
4322+ "md5": "54f7791b0a2a0cb18e3b25c32d1fbde2",
4323+ "size": 1800
4324+ },
4325+ "http://ports.ubuntu.com/pool/main/l/linux/nic-usb-modules-4.4.0-142-generic-di_4.4.0-142.168_ppc64el.udeb": {
4326+ "md5": "16f99d5116f136e824af275718ea2c8e",
4327+ "size": 296370
4328+ },
4329+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-image-virtual-lts-vivid_4.4.0.142.148_ppc64el.deb": {
4330+ "md5": "dfb02fffe9fad930361dea59cfad0798",
4331+ "size": 1824
4332+ },
4333+ "http://ports.ubuntu.com/pool/main/l/linux/ppp-modules-4.4.0-142-generic-di_4.4.0-142.168_ppc64el.udeb": {
4334+ "md5": "f5faf9e86898855f7468ff042308bf3c",
4335+ "size": 27866
4336+ },
4337+ "http://ports.ubuntu.com/pool/main/l/linux/ipmi-modules-4.4.0-142-generic-di_4.4.0-142.168_ppc64el.udeb": {
4338+ "md5": "311a1d83597541a3f2ec83e18e2fc4db",
4339+ "size": 59984
4340+ },
4341+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-headers-virtual-lts-wily_4.4.0.142.148_ppc64el.deb": {
4342+ "md5": "cdadc9dba3b2f3af3c49cffbf7c37db9",
4343+ "size": 1790
4344+ },
4345+ "http://ports.ubuntu.com/pool/main/l/linux/floppy-modules-4.4.0-142-generic-di_4.4.0-142.168_ppc64el.udeb": {
4346+ "md5": "967c87ba8240f90098dcb2a203b76725",
4347+ "size": 36066
4348+ },
4349+ "http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-4.4.0-142-generic-di_4.4.0-142.168_ppc64el.udeb": {
4350+ "md5": "13d4a57564c6d2300d8b9ee5eb371c5e",
4351+ "size": 280718
4352+ },
4353+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-headers-virtual-lts-xenial_4.4.0.142.148_ppc64el.deb": {
4354+ "md5": "0ba034c4f4cbc8c92ecfd9a48ac8a5e5",
4355+ "size": 1790
4356+ },
4357+ "http://ports.ubuntu.com/pool/main/l/linux/kernel-image-4.4.0-142-generic-di_4.4.0-142.168_ppc64el.udeb": {
4358+ "md5": "981a076cdf635cc4c538d67e4d657824",
4359+ "size": 6272844
4360+ },
4361+ "http://ports.ubuntu.com/pool/main/l/linux/virtio-modules-4.4.0-142-generic-di_4.4.0-142.168_ppc64el.udeb": {
4362+ "md5": "c34b21e3a01856eafd6384978a34fbc6",
4363+ "size": 11746
4364+ },
4365+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-headers-virtual-lts-vivid_4.4.0.142.148_ppc64el.deb": {
4366+ "md5": "eb7617db2bd8e2bfee7609cfa9ce9afa",
4367+ "size": 1784
4368+ },
4369+ "http://ports.ubuntu.com/pool/main/l/linux/linux-tools-4.4.0-142_4.4.0-142.168_ppc64el.deb": {
4370+ "md5": "c263dfe59b0ce14d22115d735c031e17",
4371+ "size": 606666
4372+ },
4373+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-generic-lts-vivid_4.4.0.142.148_ppc64el.deb": {
4374+ "md5": "85429f48f6ec6209e6ba9cf6d12914f9",
4375+ "size": 1810
4376+ },
4377+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-headers-generic-lts-utopic_4.4.0.142.148_ppc64el.deb": {
4378+ "md5": "9b5e95b99bcee4440696800f2da1aca3",
4379+ "size": 1800
4380+ },
4381+ "http://ports.ubuntu.com/pool/main/l/linux/sata-modules-4.4.0-142-generic-di_4.4.0-142.168_ppc64el.udeb": {
4382+ "md5": "860831fb0a3a168fc7a9fbcf9810432c",
4383+ "size": 113334
4384+ },
4385+ "http://ports.ubuntu.com/pool/main/l/linux/linux-libc-dev_4.4.0-142.168_ppc64el.deb": {
4386+ "md5": "730bf88717999e112106c5b1d6479d0e",
4387+ "size": 855418
4388+ },
4389+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-generic-lts-xenial_4.4.0.142.148_ppc64el.deb": {
4390+ "md5": "352283215bbad10a88e214456ca42c02",
4391+ "size": 1808
4392+ },
4393+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-generic-lts-utopic_4.4.0.142.148_ppc64el.deb": {
4394+ "md5": "92d2f8420758a6183141be3b366745cf",
4395+ "size": 1808
4396+ },
4397+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-image-generic_4.4.0.142.148_ppc64el.deb": {
4398+ "md5": "864e9f83cb4819b4a72c066bda015cd0",
4399+ "size": 2294
4400+ },
4401+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-hwe-virtual-trusty_4.4.0.142.148_ppc64el.deb": {
4402+ "md5": "1e66e15985dc7323b275ae8488076f67",
4403+ "size": 1818
4404+ }
4405+ }
4406+ },
4407+ "i386": {
4408+ "urls": {
4409+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-lowlatency-lts-xenial_4.4.0.142.148_i386.deb": {
4410+ "md5": "26ffcf7589b4e1f53682aaa4e8669565",
4411+ "size": 1798
4412+ },
4413+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fat-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4414+ "md5": "817bdf68a9fe0f95151162a0e66c6328",
4415+ "size": 2634
4416+ },
4417+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-usb-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4418+ "md5": "f627223f262aaa806cd3da70ffbb5914",
4419+ "size": 287908
4420+ },
4421+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-cloud-tools-lowlatency_4.4.0.142.148_i386.deb": {
4422+ "md5": "987a9880f0ea69472ec7751505b8d4b4",
4423+ "size": 2300
4424+ },
4425+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-hwe-virtual-trusty_4.4.0.142.148_i386.deb": {
4426+ "md5": "7e0b9be8469c973a274856207331cc98",
4427+ "size": 1814
4428+ },
4429+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-generic_4.4.0.142.148_i386.deb": {
4430+ "md5": "00210c666da4f623fb9c0cb43ad054cb",
4431+ "size": 2286
4432+ },
4433+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-virtual-lts-utopic_4.4.0.142.148_i386.deb": {
4434+ "md5": "d0c95f6af3a1220fef62086aba4f63cf",
4435+ "size": 1796
4436+ },
4437+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-lowlatency-lts-utopic_4.4.0.142.148_i386.deb": {
4438+ "md5": "64bd72556e1252bf268715a1e7ab82de",
4439+ "size": 1800
4440+ },
4441+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-extra-virtual-lts-vivid_4.4.0.142.148_i386.deb": {
4442+ "md5": "53125b628ecef7b3482d89380f3d4abb",
4443+ "size": 1790
4444+ },
4445+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-extra-4.4.0-142-generic_4.4.0-142.168_i386.deb": {
4446+ "md5": "da8016a10cece9e31289ce14e21c64b1",
4447+ "size": 36167446
4448+ },
4449+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-lowlatency_4.4.0.142.148_i386.deb": {
4450+ "md5": "72ad394306b7919d4d01cc9634fa4c8f",
4451+ "size": 2290
4452+ },
4453+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-virtual-lts-xenial_4.4.0.142.148_i386.deb": {
4454+ "md5": "18a930559c6ffdb8ac2bfa4c652e76ee",
4455+ "size": 1820
4456+ },
4457+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/crypto-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4458+ "md5": "8f041d1a953c19cbe7fd2eecf2ed1c3a",
4459+ "size": 287862
4460+ },
4461+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pata-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4462+ "md5": "d2a934133bd10adc4f24a15f6a86bd8f",
4463+ "size": 135350
4464+ },
4465+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/sata-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4466+ "md5": "79a8aaffca5dd7097f2285e4780c3428",
4467+ "size": 95202
4468+ },
4469+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-cloud-tools-4.4.0-142-generic_4.4.0-142.168_i386.deb": {
4470+ "md5": "fdcf34186cd4845494bed89a59ede34c",
4471+ "size": 2544
4472+ },
4473+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-lowlatency-lts-utopic_4.4.0.142.148_i386.deb": {
4474+ "md5": "f5682053d4b33eeba85097954584b090",
4475+ "size": 1798
4476+ },
4477+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-crashdump_4.4.0.142.148_i386.deb": {
4478+ "md5": "10262913b92a5be65d7406b34822a17c",
4479+ "size": 2528
4480+ },
4481+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-generic-lts-wily_4.4.0.142.148_i386.deb": {
4482+ "md5": "b7c8bbde00984c1fbb559f2948f7055b",
4483+ "size": 1792
4484+ },
4485+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-lts-utopic_4.4.0.142.148_i386.deb": {
4486+ "md5": "64a5cb1ebbacd0c75470225ae212b6c7",
4487+ "size": 1792
4488+ },
4489+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-virtual_4.4.0.142.148_i386.deb": {
4490+ "md5": "9dabbeead2180c2e40cdbb0cc4206483",
4491+ "size": 2294
4492+ },
4493+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-lowlatency-lts-xenial_4.4.0.142.148_i386.deb": {
4494+ "md5": "397c5ce09642aa957a403f7dbbbf14f4",
4495+ "size": 1798
4496+ },
4497+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ipmi-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4498+ "md5": "843fa369ff08a12e116cd736be3278f8",
4499+ "size": 56626
4500+ },
4501+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-generic-lts-vivid_4.4.0.142.148_i386.deb": {
4502+ "md5": "b4c44163bafcb7c04e99f94b7feb8ad9",
4503+ "size": 1792
4504+ },
4505+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-virtual-lts-vivid_4.4.0.142.148_i386.deb": {
4506+ "md5": "138ddb5531141b1af530ddde49aab8de",
4507+ "size": 1816
4508+ },
4509+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-generic_4.4.0.142.148_i386.deb": {
4510+ "md5": "2d9e993eb356d79b91b40246185102d4",
4511+ "size": 2326
4512+ },
4513+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-cloud-tools-lowlatency-lts-vivid_4.4.0.142.148_i386.deb": {
4514+ "md5": "73133a30595a4481bec227fb93785642",
4515+ "size": 1804
4516+ },
4517+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-generic-lts-utopic_4.4.0.142.148_i386.deb": {
4518+ "md5": "85416d6679e795d45ca1a6481c9857fb",
4519+ "size": 1800
4520+ },
4521+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-generic-lts-xenial_4.4.0.142.148_i386.deb": {
4522+ "md5": "5bbc54527014ee00b398075233816876",
4523+ "size": 1798
4524+ },
4525+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-generic_4.4.0.142.148_i386.deb": {
4526+ "md5": "e29b4ae4b4527a87bb75f6839ad2cf3d",
4527+ "size": 2280
4528+ },
4529+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-cloud-tools-virtual_4.4.0.142.148_i386.deb": {
4530+ "md5": "6381e2ad5fca8fa9beef080f51b7e19f",
4531+ "size": 2312
4532+ },
4533+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/floppy-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4534+ "md5": "791fb70a40597bedec285ddb61af8768",
4535+ "size": 32150
4536+ },
4537+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-virtual-lts-wily_4.4.0.142.148_i386.deb": {
4538+ "md5": "779fe2d8cb21dfd97004b29f03fe4104",
4539+ "size": 1820
4540+ },
4541+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-virtual-lts-utopic_4.4.0.142.148_i386.deb": {
4542+ "md5": "94026c16d3edbccd95d35140dfb9f7f2",
4543+ "size": 1826
4544+ },
4545+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/multipath-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4546+ "md5": "5a9b322a5525d2d0555a2b884f13d106",
4547+ "size": 16912
4548+ },
4549+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-virtual-lts-vivid_4.4.0.142.148_i386.deb": {
4550+ "md5": "f498b82cbcfb23d90e1969e6ab535443",
4551+ "size": 1820
4552+ },
4553+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nfs-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4554+ "md5": "0605d9500e43c1fe7295571db5def074",
4555+ "size": 489456
4556+ },
4557+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-generic-lts-wily_4.4.0.142.148_i386.deb": {
4558+ "md5": "7ae641c6492772f9d348767c375007a0",
4559+ "size": 1804
4560+ },
4561+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/usb-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4562+ "md5": "bed89bc6d878d0a215f54130a84966f6",
4563+ "size": 134102
4564+ },
4565+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-shared-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4566+ "md5": "78d38e0107072ba266dd716de3506d1d",
4567+ "size": 493764
4568+ },
4569+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-tools-4.4.0-142-generic_4.4.0-142.168_i386.deb": {
4570+ "md5": "1fe2183c3058de010c2bbd4b7f7d940e",
4571+ "size": 2596
4572+ },
4573+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-generic-lts-wily_4.4.0.142.148_i386.deb": {
4574+ "md5": "544a5c4109221316a73e53d2b0881d2f",
4575+ "size": 1794
4576+ },
4577+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/irda-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4578+ "md5": "3292e78d1671cd72a294316ba3a18443",
4579+ "size": 230384
4580+ },
4581+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-cloud-tools-lowlatency-lts-xenial_4.4.0.142.148_i386.deb": {
4582+ "md5": "796fc838d54845d0b5c75577ed61efd1",
4583+ "size": 1808
4584+ },
4585+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/ppp-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4586+ "md5": "4de3a2085dfbc82ad79cbd93f9cc8b4b",
4587+ "size": 25468
4588+ },
4589+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-lowlatency-lts-wily_4.4.0.142.148_i386.deb": {
4590+ "md5": "b03cf24d33690a4cfb19f63481d78ac0",
4591+ "size": 1796
4592+ },
4593+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/md-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4594+ "md5": "22a51dbcb50303adfcb053176309f25c",
4595+ "size": 263034
4596+ },
4597+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-generic-lts-wily_4.4.0.142.148_i386.deb": {
4598+ "md5": "cfb4435b45b48ae400286b38c6a9218d",
4599+ "size": 1792
4600+ },
4601+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-virtual-lts-xenial_4.4.0.142.148_i386.deb": {
4602+ "md5": "b8fbccca96e19ba74d547048f0ea9807",
4603+ "size": 1824
4604+ },
4605+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-lowlatency-lts-xenial_4.4.0.142.148_i386.deb": {
4606+ "md5": "56ac2db20ee1cd4b95d678c75c231e71",
4607+ "size": 1796
4608+ },
4609+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-generic-lts-vivid_4.4.0.142.148_i386.deb": {
4610+ "md5": "6c1488291063767b41410976215b5b9f",
4611+ "size": 1802
4612+ },
4613+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-cloud-tools-4.4.0-142_4.4.0-142.168_i386.deb": {
4614+ "md5": "9dadd053ada1f1d82d617bdf9db2e625",
4615+ "size": 63716
4616+ },
4617+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-extra-virtual-lts-utopic_4.4.0.142.148_i386.deb": {
4618+ "md5": "dd4cd4639a0914b25d182a5adbea1610",
4619+ "size": 1790
4620+ },
4621+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/mouse-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4622+ "md5": "323231921b3bac56caca51d10a1113f9",
4623+ "size": 53992
4624+ },
4625+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-lowlatency-lts-vivid_4.4.0.142.148_i386.deb": {
4626+ "md5": "1889c0457fdcb794a951b0a6a6785b27",
4627+ "size": 1800
4628+ },
4629+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-4.4.0-142-lowlatency_4.4.0-142.168_i386.deb": {
4630+ "md5": "216b0c8634910d8bd08cef7021d7dbd6",
4631+ "size": 801022
4632+ },
4633+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-virtual-lts-wily_4.4.0.142.148_i386.deb": {
4634+ "md5": "1fcdf93897cec4a958f67da4d043588a",
4635+ "size": 1784
4636+ },
4637+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-lowlatency_4.4.0.142.148_i386.deb": {
4638+ "md5": "a683365ddc302fc0536ffed058b3a2e2",
4639+ "size": 1782
4640+ },
4641+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-virtual-lts-utopic_4.4.0.142.148_i386.deb": {
4642+ "md5": "87ecda5a411d1f1035167ab4c45aa6f7",
4643+ "size": 1820
4644+ },
4645+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/input-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4646+ "md5": "f0628442aa89765ac537469d87e153f7",
4647+ "size": 286508
4648+ },
4649+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-lowlatency-lts-vivid_4.4.0.142.148_i386.deb": {
4650+ "md5": "59045cb38a98af9018e5c3a3be6dd51e",
4651+ "size": 1798
4652+ },
4653+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-virtual-lts-xenial_4.4.0.142.148_i386.deb": {
4654+ "md5": "5b81355b7a5b2ced91376dd76b984460",
4655+ "size": 1786
4656+ },
4657+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-generic-lts-vivid_4.4.0.142.148_i386.deb": {
4658+ "md5": "73e86ab873cd2b74c4e7da005254a729",
4659+ "size": 1794
4660+ },
4661+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-4.4.0-142-lowlatency_4.4.0-142.168_i386.deb": {
4662+ "md5": "b7fc5a366b507852aed9bc6b8833eaf9",
4663+ "size": 57211644
4664+ },
4665+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4666+ "md5": "b06c61c5c0fe34c1486250578e95ea34",
4667+ "size": 80436
4668+ },
4669+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-cloud-tools-lowlatency-lts-wily_4.4.0.142.148_i386.deb": {
4670+ "md5": "600758ca2e82e7d5601957e75e6da7e9",
4671+ "size": 1806
4672+ },
4673+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-cloud-tools-4.4.0-142-lowlatency_4.4.0-142.168_i386.deb": {
4674+ "md5": "740a400d5c07a705a3b070d6a2dbf45b",
4675+ "size": 2548
4676+ },
4677+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-virtual-lts-vivid_4.4.0.142.148_i386.deb": {
4678+ "md5": "3587cfe7119b66f81a835313a38433e7",
4679+ "size": 1796
4680+ },
4681+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-tools-4.4.0-142_4.4.0-142.168_i386.deb": {
4682+ "md5": "2fc4e39a083c8151234cd061e970e89a",
4683+ "size": 711136
4684+ },
4685+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-generic-lts-vivid_4.4.0.142.148_i386.deb": {
4686+ "md5": "549cdec8ea595a098165bf5d91e5793f",
4687+ "size": 1800
4688+ },
4689+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/block-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4690+ "md5": "0222bd6ba36f9efb423df1c30b0ed18b",
4691+ "size": 377270
4692+ },
4693+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-generic-lts-utopic_4.4.0.142.148_i386.deb": {
4694+ "md5": "68676e3fed19a04293d8e7c9ef6176c5",
4695+ "size": 1798
4696+ },
4697+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-extra-virtual-lts-xenial_4.4.0.142.148_i386.deb": {
4698+ "md5": "79bb2e4540918c21d243ded927d08574",
4699+ "size": 1790
4700+ },
4701+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-virtual_4.4.0.142.148_i386.deb": {
4702+ "md5": "7e971435b76afbb72766caf43dc8edb4",
4703+ "size": 1758
4704+ },
4705+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-cloud-tools-virtual-lts-wily_4.4.0.142.148_i386.deb": {
4706+ "md5": "b63e02fa9947f1b8995b97bbf418fdd6",
4707+ "size": 1832
4708+ },
4709+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-libc-dev_4.4.0-142.168_i386.deb": {
4710+ "md5": "ad55c840c2f931147d6cc3e0a76abddc",
4711+ "size": 866704
4712+ },
4713+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-generic-lts-xenial_4.4.0.142.148_i386.deb": {
4714+ "md5": "debe160ce63d600005b0dd4baff14710",
4715+ "size": 1798
4716+ },
4717+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/kernel-image-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4718+ "md5": "c66a2f2339223d609a19c90eca13838c",
4719+ "size": 7492898
4720+ },
4721+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4722+ "md5": "c611e10a43a0809a6c24c7dcc7bc0537",
4723+ "size": 4305186
4724+ },
4725+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-virtual-lts-vivid_4.4.0.142.148_i386.deb": {
4726+ "md5": "f340916174978babf18fd6c78cb5d7d1",
4727+ "size": 1782
4728+ },
4729+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-generic-lts-xenial_4.4.0.142.148_i386.deb": {
4730+ "md5": "80aebc5fecc265414295cecf8abd1b6e",
4731+ "size": 1800
4732+ },
4733+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-virtual_4.4.0.142.148_i386.deb": {
4734+ "md5": "e8b80a6bd7c0fb968a00726832da86f9",
4735+ "size": 1778
4736+ },
4737+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/nic-pcmcia-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4738+ "md5": "88b86c5bea85b22d59c419cc169ff2e0",
4739+ "size": 143760
4740+ },
4741+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-cloud-tools-generic-lts-vivid_4.4.0.142.148_i386.deb": {
4742+ "md5": "ed864571d7e647c28d71a6767174a0b6",
4743+ "size": 1804
4744+ },
4745+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/virtio-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4746+ "md5": "a19f8d98cf2ddefe17c2429e3f61bc4e",
4747+ "size": 103872
4748+ },
4749+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-lowlatency-lts-wily_4.4.0.142.148_i386.deb": {
4750+ "md5": "6a6a047d683791bd836e9110bbf7ffc8",
4751+ "size": 1792
4752+ },
4753+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-generic-lts-xenial_4.4.0.142.148_i386.deb": {
4754+ "md5": "7b41c37355f1593b2fa8f5cd670a4de5",
4755+ "size": 1798
4756+ },
4757+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/plip-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4758+ "md5": "a7d23f79f6c5b6701ed2464aa26aa792",
4759+ "size": 9236
4760+ },
4761+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-extra-virtual_4.4.0.142.148_i386.deb": {
4762+ "md5": "6c5d02250dea2f3025e63f184899aa17",
4763+ "size": 1766
4764+ },
4765+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-lowlatency-lts-wily_4.4.0.142.148_i386.deb": {
4766+ "md5": "93ee1dcfeb5010e3cba71e3636b2c355",
4767+ "size": 1800
4768+ },
4769+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/message-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4770+ "md5": "8cc6917d7015571b6ebe86232e9d5447",
4771+ "size": 198842
4772+ },
4773+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/storage-core-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4774+ "md5": "777d8e460bedf9e9afc60e6232d0152b",
4775+ "size": 46118
4776+ },
4777+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-extra-virtual-lts-wily_4.4.0.142.148_i386.deb": {
4778+ "md5": "1ef17646739e0fa4700d7c1e6d289f31",
4779+ "size": 1792
4780+ },
4781+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-cloud-tools-generic_4.4.0.142.148_i386.deb": {
4782+ "md5": "954406da20c480641029f4559f1e3b27",
4783+ "size": 2296
4784+ },
4785+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/vlan-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4786+ "md5": "9a4c73bb48fa802d8909b68bc1c25f12",
4787+ "size": 27424
4788+ },
4789+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-lowlatency_4.4.0.142.148_i386.deb": {
4790+ "md5": "640fc9d96ff1aa4f78ea7b9794405035",
4791+ "size": 2284
4792+ },
4793+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-lowlatency_4.4.0.142.148_i386.deb": {
4794+ "md5": "7f2c3318d8b0b929248e0057ed5484f0",
4795+ "size": 2320
4796+ },
4797+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-lowlatency-lts-wily_4.4.0.142.148_i386.deb": {
4798+ "md5": "fdd5967b55cf61d61ca0a31c28a62892",
4799+ "size": 1798
4800+ },
4801+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-image-4.4.0-142-generic_4.4.0-142.168_i386.deb": {
4802+ "md5": "d0ebf0c2fe1a4a718aaa49361c341e58",
4803+ "size": 20829726
4804+ },
4805+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/serial-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4806+ "md5": "bf2148fc9fa81ea1dd6c00c20e5fb131",
4807+ "size": 88596
4808+ },
4809+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/parport-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4810+ "md5": "1ffb9fd424aecd69bf1109f6a7625a45",
4811+ "size": 32944
4812+ },
4813+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-hwe-virtual-trusty_4.4.0.142.148_i386.deb": {
4814+ "md5": "8a530368a7c330ef0a4dd967b0364bef",
4815+ "size": 1814
4816+ },
4817+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-tools-4.4.0-142-lowlatency_4.4.0-142.168_i386.deb": {
4818+ "md5": "3553f75675f08fcf1fbb3b7ea4b3ec35",
4819+ "size": 2606
4820+ },
4821+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-lowlatency-lts-vivid_4.4.0.142.148_i386.deb": {
4822+ "md5": "7e8dd8882101e20e20de756e97a77619",
4823+ "size": 1798
4824+ },
4825+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-generic-lts-utopic_4.4.0.142.148_i386.deb": {
4826+ "md5": "ad5113a7feab8ca00b63ca1486d724f5",
4827+ "size": 1796
4828+ },
4829+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/firewire-core-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4830+ "md5": "f03f44e5c1a18a1ffa7cf2d46120e66b",
4831+ "size": 67172
4832+ },
4833+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/scsi-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4834+ "md5": "73f89ecb886567a4a6b3dec8b5150ee3",
4835+ "size": 2270166
4836+ },
4837+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-lowlatency-lts-utopic_4.4.0.142.148_i386.deb": {
4838+ "md5": "2a4bcd2c92a537716c40d7ecb1272df1",
4839+ "size": 1798
4840+ },
4841+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/pcmcia-storage-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4842+ "md5": "1b16aff3c1832a13e3a503ab93e0a3d7",
4843+ "size": 75052
4844+ },
4845+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-lowlatency-lts-vivid_4.4.0.142.148_i386.deb": {
4846+ "md5": "4eebf345c7391f1700d0cd629484a302",
4847+ "size": 1798
4848+ },
4849+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-virtual_4.4.0.142.148_i386.deb": {
4850+ "md5": "d9900909f393860a2cbde0f416fc01e3",
4851+ "size": 2290
4852+ },
4853+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-cloud-tools-generic-lts-wily_4.4.0.142.148_i386.deb": {
4854+ "md5": "874e35a108221acf52e0df5b41dd7374",
4855+ "size": 1802
4856+ },
4857+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-tools-lowlatency-lts-utopic_4.4.0.142.148_i386.deb": {
4858+ "md5": "1e7ecd20924e8d44c50a11153363c8e0",
4859+ "size": 1798
4860+ },
4861+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-virtual-lts-wily_4.4.0.142.148_i386.deb": {
4862+ "md5": "aa96a33615760f05bcaa33953e55e46c",
4863+ "size": 1820
4864+ },
4865+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-secondary-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4866+ "md5": "5063dcabc4ae8dfac7bce0e8a805ae90",
4867+ "size": 626628
4868+ },
4869+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-virtual-lts-wily_4.4.0.142.148_i386.deb": {
4870+ "md5": "368f36ad64ae9f30140b5ec1caea7e91",
4871+ "size": 1794
4872+ },
4873+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-generic-lts-utopic_4.4.0.142.148_i386.deb": {
4874+ "md5": "fb631641974ceff962b948fe7de20a7a",
4875+ "size": 1796
4876+ },
4877+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-headers-4.4.0-142-generic_4.4.0-142.168_i386.deb": {
4878+ "md5": "e64038394d524f0a984b7beb4b750700",
4879+ "size": 803420
4880+ },
4881+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fb-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4882+ "md5": "894ce2cd5a192d9cc7f3d1ace274ccc9",
4883+ "size": 13130
4884+ },
4885+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-cloud-tools-virtual-lts-xenial_4.4.0.142.148_i386.deb": {
4886+ "md5": "890b0ea7da3301aeb3a0d8bf032801ad",
4887+ "size": 1832
4888+ },
4889+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-hwe-generic-trusty_4.4.0.142.148_i386.deb": {
4890+ "md5": "33205bb2165525c7b5e38d72542d42bf",
4891+ "size": 1814
4892+ },
4893+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-virtual-lts-xenial_4.4.0.142.148_i386.deb": {
4894+ "md5": "126b779d9297f4c9726db9911a5e9e5d",
4895+ "size": 1798
4896+ },
4897+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/fs-core-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4898+ "md5": "763c153d6f76b4390b3ea9a3658cfdc3",
4899+ "size": 533568
4900+ },
4901+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-generic_4.4.0.142.148_i386.deb": {
4902+ "md5": "1e0f4d5df1b83368860dae174a46026e",
4903+ "size": 1784
4904+ },
4905+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-cloud-tools-generic-lts-xenial_4.4.0.142.148_i386.deb": {
4906+ "md5": "882a51e0be9ec6e1d11d45e8ca4147e3",
4907+ "size": 1802
4908+ },
4909+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-image-lowlatency-lts-xenial_4.4.0.142.148_i386.deb": {
4910+ "md5": "5cb007566645981f7a99ea3bba978fea",
4911+ "size": 1798
4912+ },
4913+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-headers-virtual-lts-utopic_4.4.0.142.148_i386.deb": {
4914+ "md5": "ef5cd58ccc0d837202a606d923b78ba3",
4915+ "size": 1784
4916+ },
4917+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/speakup-modules-4.4.0-142-generic-di_4.4.0-142.168_i386.udeb": {
4918+ "md5": "b04755e3c4b99cb4479242238fc92add",
4919+ "size": 53036
4920+ },
4921+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-cloud-tools-virtual-lts-vivid_4.4.0.142.148_i386.deb": {
4922+ "md5": "604127bd7ca96a9e360d581169cec3c7",
4923+ "size": 1828
4924+ },
4925+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux-meta/linux-hwe-generic-trusty_4.4.0.142.148_i386.deb": {
4926+ "md5": "16052f4418f73dfa29b218ca5a106fc8",
4927+ "size": 1816
4928+ },
4929+ "http://security.ubuntu.com/ubuntu/pool/main/l/linux/linux-udebs-generic_4.4.0-142.168_i386.udeb": {
4930+ "md5": "05a0fad4208f9d62b8fa20d18a863954",
4931+ "size": 944
4932+ }
4933+ }
4934+ },
4935+ "powerpc": {
4936+ "urls": {
4937+ "http://ports.ubuntu.com/pool/main/l/linux/linux-tools-4.4.0-142_4.4.0-142.168_powerpc.deb": {
4938+ "md5": "c935eaabcb96a9f7833e3478433affbc",
4939+ "size": 591368
4940+ },
4941+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-tools-powerpc64-smp-lts-utopic_4.4.0.142.148_powerpc.deb": {
4942+ "md5": "aef830530ff0aa03491d2a2cd89d8cfa",
4943+ "size": 1806
4944+ },
4945+ "http://ports.ubuntu.com/pool/main/l/linux/nic-modules-4.4.0-142-powerpc-e500mc-di_4.4.0-142.168_powerpc.udeb": {
4946+ "md5": "c87290ac37087bf60245edfc38efd6c4",
4947+ "size": 2296784
4948+ },
4949+ "http://ports.ubuntu.com/pool/main/l/linux/virtio-modules-4.4.0-142-powerpc-e500mc-di_4.4.0-142.168_powerpc.udeb": {
4950+ "md5": "f02583e4fc6b40fbc2caa6ba48163617",
4951+ "size": 11262
4952+ },
4953+ "http://ports.ubuntu.com/pool/main/l/linux/input-modules-4.4.0-142-powerpc-e500mc-di_4.4.0-142.168_powerpc.udeb": {
4954+ "md5": "7bfb53c34137db50d672bcbaba4516e6",
4955+ "size": 256038
4956+ },
4957+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-tools-powerpc-smp-lts-wily_4.4.0.142.148_powerpc.deb": {
4958+ "md5": "74c775de46c0e5e9c387d37d06c2be98",
4959+ "size": 1802
4960+ },
4961+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-headers-powerpc-smp-lts-xenial_4.4.0.142.148_powerpc.deb": {
4962+ "md5": "e8152cab48cf860242ded395ad64addc",
4963+ "size": 1808
4964+ },
4965+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-image-powerpc64-smp-lts-wily_4.4.0.142.148_powerpc.deb": {
4966+ "md5": "032d3ba0d3f089cc290dcf8ff3ffec10",
4967+ "size": 1812
4968+ },
4969+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-image-powerpc-smp-lts-vivid_4.4.0.142.148_powerpc.deb": {
4970+ "md5": "ef0d8f2d6ba4c051088b62b16c725feb",
4971+ "size": 1806
4972+ },
4973+ "http://ports.ubuntu.com/pool/main/l/linux/crypto-modules-4.4.0-142-powerpc-e500mc-di_4.4.0-142.168_powerpc.udeb": {
4974+ "md5": "255e22a9726f063be91fa46ddf29aeae",
4975+ "size": 273492
4976+ },
4977+ "http://ports.ubuntu.com/pool/main/l/linux/vlan-modules-4.4.0-142-powerpc-e500mc-di_4.4.0-142.168_powerpc.udeb": {
4978+ "md5": "5f4ff7c09a494fe81c546b452c78268e",
4979+ "size": 26684
4980+ },
4981+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-headers-powerpc64-smp-lts-wily_4.4.0.142.148_powerpc.deb": {
4982+ "md5": "1ff3166a53489547e9b565f263967bb2",
4983+ "size": 1812
4984+ },
4985+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-image-powerpc64-smp-lts-xenial_4.4.0.142.148_powerpc.deb": {
4986+ "md5": "15f5540848ed99dd29f9a6b8f57c6eab",
4987+ "size": 1808
4988+ },
4989+ "http://ports.ubuntu.com/pool/main/l/linux/irda-modules-4.4.0-142-powerpc-e500mc-di_4.4.0-142.168_powerpc.udeb": {
4990+ "md5": "95f83508b28ea70abe9281e669a6f97b",
4991+ "size": 232602
4992+ },
4993+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-image-powerpc-smp_4.4.0.142.148_powerpc.deb": {
4994+ "md5": "effb7d6d5368e173fedac08c169a6ed1",
4995+ "size": 2354
4996+ },
4997+ "http://ports.ubuntu.com/pool/main/l/linux-meta/linux-tools-lts-utopic_4.4.0.142.148_powerpc.deb": {
4998+ "md5": "051f85e7c2ebbb77c142fc4da51bce60",
4999+ "size": 1798
5000+ },
The diff has been truncated for viewing.

Subscribers

People subscribed via source and target branches