mod_cgi in lighttpd 1.4.18 sends the source code of CGI scripts instead of a 500 error when a fork failure occurs, which might allow remote attackers to obtain sensitive information.
lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html
secunia.com/advisories/29209
secunia.com/advisories/29235
secunia.com/advisories/29268
secunia.com/advisories/29275
secunia.com/advisories/29318
secunia.com/advisories/29622
security.gentoo.org/glsa/glsa-200803-10.xml
trac.lighttpd.net/trac/changeset/2107
wiki.rpath.com/wiki/Advisories:rPSA-2008-0106
www.debian.org/security/2008/dsa-1513
www.securityfocus.com/archive/1/489465/100/0/threaded
www.securityfocus.com/bid/28100
www.vupen.com/english/advisories/2008/0763
bugs.gentoo.org/show_bug.cgi?id=211956
exchange.xforce.ibmcloud.com/vulnerabilities/41008
issues.rpath.com/browse/RPL-2326
www.redhat.com/archives/fedora-package-announce/2008-March/msg00162.html
www.redhat.com/archives/fedora-package-announce/2008-March/msg00180.html