Lighttpd 1.4.56 through 1.4.58 allows a remote attacker to cause a denial of service (CPU consumption from stuck connections) because connectionreadheader_more in connections.c has a typo that disrupts use of multiple read operations on large headers.
{
    "binaries": [
        {
            "binary_name": "lighttpd",
            "binary_version": "1.4.35-4ubuntu2.1+esm1"
        },
        {
            "binary_name": "lighttpd-dev",
            "binary_version": "1.4.35-4ubuntu2.1+esm1"
        },
        {
            "binary_name": "lighttpd-mod-cml",
            "binary_version": "1.4.35-4ubuntu2.1+esm1"
        },
        {
            "binary_name": "lighttpd-mod-magnet",
            "binary_version": "1.4.35-4ubuntu2.1+esm1"
        },
        {
            "binary_name": "lighttpd-mod-mysql-vhost",
            "binary_version": "1.4.35-4ubuntu2.1+esm1"
        },
        {
            "binary_name": "lighttpd-mod-trigger-b4-dl",
            "binary_version": "1.4.35-4ubuntu2.1+esm1"
        },
        {
            "binary_name": "lighttpd-mod-webdav",
            "binary_version": "1.4.35-4ubuntu2.1+esm1"
        }
    ]
}