It was found that ASN.1 CHOICE types are not correctly handled by the ASN.1 parser when parsing X.509 certificates with extensions that use such types. This could lead to infinite looping of the thread parsing a specifically crafted certificate. External References: https://www.strongswan.org/blog/2017/05/30/strongswan-vulnerability-(cve-2017-9023).html
Created strongswan tracking bugs for this issue: Affects: epel-all [bug 1457123] Affects: fedora-all [bug 1457124]
Patches: https://download.strongswan.org/security/CVE-2017-9023/
Statement: Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.