+++ This bug was initially created as a clone of Bug #204993 +++ (Description from MITRE) Multiple heap-based buffer overflows in the (1) str_repeat and (2) wordwrap functions in ext/standard/string.c in PHP before 5.1.5, when used on a 64-bit system, have unspecified impact and attack vectors, a different vulnerability than CVE-2006-1990. This is the result of using int = size_t * sizt_t where int is 32 bits and size_t is 64 bits. The odds of exploiting this remotely are slim as you would probably have to send 2 gigs of data to a broken app. http://www.php.net/release_5_1_5.php http://cvs.php.net/viewvc.cgi/php-src/ext/standard/string.c?r1=1.445.2.14.2.10&r2=1.445.2.14.2.11
Fixed in FEDORA-2006-1024: http://www.redhat.com/archives/fedora-package-announce/2006-October/msg00028.html