Bugzilla – Bug 935773
VUL-0: CVE-2015-0886: rubygem-bcrypt-ruby: jBCrypt: integer overflow in the crypt_raw method
Last modified: 2016-04-27 19:25:53 UTC
via rh bugzilla https://bugzilla.redhat.com/show_bug.cgi?id=1197815 Integer overflow in the crypt_raw method in the key-stretching implementation in jBCrypt before 0.4 makes it easier for remote attackers to determine cleartext values of password hashes via a brute-force attack against hashes associated with the maximum exponent. References: http://jvn.jp/en/jp/JVN77718330/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2015-000033 http://www.mindrot.org/projects/jBCrypt/news/rel04.html https://bugzilla.mindrot.org/show_bug.cgi?id=2097 http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151797.html http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151786.html http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151496.html
bugbot adjusting priority
This affects jruby implementation. We don't have a jruby packages. Thus this bug does not apply.