Integer overflow in the crypt_raw method in the key-stretching implementation in jBCrypt before 0.4 makes it easier for remote attackers to determine cleartext values of password hashes via a brute-force attack against hashes associated with the maximum exponent.
jvn.jp/en/jp/JVN77718330/index.html
jvndb.jvn.jp/jvndb/JVNDB-2015-000033
lists.fedoraproject.org/pipermail/package-announce/2015-March/151496.html
lists.fedoraproject.org/pipermail/package-announce/2015-March/151786.html
lists.fedoraproject.org/pipermail/package-announce/2015-March/151797.html
www.mindrot.org/projects/jBCrypt/news/rel04.html
bugzilla.mindrot.org/show_bug.cgi?id=2097
lists.apache.org/thread.html/rbd23e3ac8113b4da0a025c0e45170b6ec317383a1cf06090c2c717aa%40%3Ccommits.cassandra.apache.org%3E
lists.apache.org/thread.html/rd5c2256b8dc9935e4bb5e9be90adce58408054bb42523730a40c5548%40%3Ccommits.cassandra.apache.org%3E
lists.apache.org/thread.html/re330cfe9e5d84e3f7da8ace23ec32f38cb3fbd328bf177badd7ad942%40%3Ccommits.cassandra.apache.org%3E