Integer overflow in the crypt_raw method in the key-stretching implementation in jBCrypt before 0.4 makes it easier for remote attackers to determine cleartext values of password hashes via a brute-force attack against hashes associated with the maximum exponent.
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151797.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151786.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151496.html