mod_cgi in lighttpd 1.4.18 sends the source code of CGI scripts instead of a 500 error when a fork failure occurs, which might allow remote attackers to obtain sensitive information.
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00180.html
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00162.html
https://issues.rpath.com/browse/RPL-2326
https://exchange.xforce.ibmcloud.com/vulnerabilities/41008
https://bugs.gentoo.org/show_bug.cgi?id=211956
http://www.vupen.com/english/advisories/2008/0763
http://www.securityfocus.com/bid/28100
http://www.securityfocus.com/archive/1/489465/100/0/threaded
http://www.debian.org/security/2008/dsa-1513
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0106
http://trac.lighttpd.net/trac/changeset/2107
http://security.gentoo.org/glsa/glsa-200803-10.xml
http://secunia.com/advisories/29622
http://secunia.com/advisories/29318
http://secunia.com/advisories/29275
http://secunia.com/advisories/29268
http://secunia.com/advisories/29235
http://secunia.com/advisories/29209
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html