{"id":"DLA-1358-1","summary":"ruby1.9.1 - security update","modified":"2026-03-09T01:01:11.755009Z","published":"2018-04-23T00:00:00Z","upstream":["CVE-2017-17742","CVE-2018-1000075","CVE-2018-1000076","CVE-2018-1000077","CVE-2018-1000078","CVE-2018-6914","CVE-2018-8777","CVE-2018-8778","CVE-2018-8779","CVE-2018-8780","DEBIAN-CVE-2017-17742","DEBIAN-CVE-2018-1000075","DEBIAN-CVE-2018-1000076","DEBIAN-CVE-2018-1000077","DEBIAN-CVE-2018-1000078","DEBIAN-CVE-2018-6914","DEBIAN-CVE-2018-8777","DEBIAN-CVE-2018-8778","DEBIAN-CVE-2018-8779","DEBIAN-CVE-2018-8780"],"affected":[{"package":{"name":"ruby1.9.1","ecosystem":"Debian:7","purl":"pkg:deb/debian/ruby1.9.1?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.9.3.194-8.1+deb7u8"}]}],"versions":["1.9.3.194-8.1","1.9.3.194-8.1+deb7u1","1.9.3.194-8.1+deb7u2","1.9.3.194-8.1+deb7u3","1.9.3.194-8.1+deb7u5","1.9.3.194-8.1+deb7u6","1.9.3.194-8.1+deb7u7"],"database_specific":{"source":"https://storage.googleapis.com/debian-osv/dla-osv/DLA-1358-1.json"}}],"schema_version":"1.7.3"}