Integer overflow in the crypt_raw method in the key-stretching implementation in jBCrypt before 0.4 makes it easier for remote attackers to determine cleartext values of password hashes via a brute-force attack against hashes associated with the maximum exponent.
https://bugzilla.mindrot.org/show_bug.cgi?id=2097
http://www.mindrot.org/projects/jBCrypt/news/rel04.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151797.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151786.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151496.html